Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
Static task
static1
Behavioral task
behavioral1
Sample
c91461d5d48ffca9280ac0bda9c4c74f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c91461d5d48ffca9280ac0bda9c4c74f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c91461d5d48ffca9280ac0bda9c4c74f_JaffaCakes118
Size
783KB
MD5
c91461d5d48ffca9280ac0bda9c4c74f
SHA1
50b6dd6de241db0c27f098309b40c9a5ab069ac8
SHA256
f87310cfedcd338f21ad048a3c960688149f16f7dc00d36076a7c54736315a9b
SHA512
edbe59c7fad3c188bf6d49c5593d94fdfe81d0032faeec5e8d7e782c44c008ad4de389cbe97eddb95ae533c289e46c9ee8481c98bc9c78e76800f651a049d6d7
SSDEEP
24576:1eTxq1PI+5obBddL77h/qp2uSsDpyOrHaTAen1VP:1e8DobBr77h/qp2uppymHaAenTP
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sleep
EnterCriticalSection
LoadLibraryA
GetModuleHandleA
CloseHandle
InterlockedIncrement
InterlockedDecrement
GetModuleHandleExW
VirtualFree
IsBadReadPtr
GetLastError
GetProcAddress
GetFullPathNameW
GetEnvironmentVariableW
GetCurrentDirectoryW
GetFileAttributesExW
LeaveCriticalSection
DeleteCriticalSection
WaitForSingleObject
GetProcessHeap
WriteFile
SetLastError
DeleteFileA
ExitProcess
HeapReAlloc
MoveFileExA
CreateProcessW
SetUnhandledExceptionFilter
SystemTimeToFileTime
GetCurrentProcess
GetTickCount
OpenProcess
TerminateProcess
GetTempFileNameA
GetLocalTime
GetProcessId
AddVectoredExceptionHandler
DuplicateHandle
GetTempPathA
GetThreadContext
GetCurrentThread
WideCharToMultiByte
GetFileAttributesA
MultiByteToWideChar
CreateDirectoryA
RemoveDirectoryA
FindClose
GetCurrentDirectoryA
GetCurrentProcessId
CreateFileW
InterlockedCompareExchange
HeapFree
HeapAlloc
FreeLibrary
UnmapViewOfFile
GetFileSize
WriteConsoleW
FlushFileBuffers
GetCurrentThreadId
LoadLibraryExW
GetCommandLineA
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
GetStdHandle
GetModuleFileNameW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetConsoleMode
SetFilePointerEx
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleCP
OutputDebugStringW
LoadLibraryW
LCMapStringW
GetStringTypeW
SetStdHandle
VirtualQuery
MessageBoxA
RegOpenKeyExA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ