Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
cf6b6b9a6a7eac59dc1f71093f0370d4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf6b6b9a6a7eac59dc1f71093f0370d4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
cf6b6b9a6a7eac59dc1f71093f0370d4_JaffaCakes118
Size
3.9MB
MD5
cf6b6b9a6a7eac59dc1f71093f0370d4
SHA1
c170ce4a38256e243f88898fedf1cfd521444872
SHA256
7aadb5bee2bc87f799d450ddd1dfbe7fece58c597d71489bd5fdd7a888441f6f
SHA512
60c59e6cf44c5943c3406557aad1b2f0ea60679aaa82787435de6830b1770b210562eb387a4141720d7218e4cfe9af460c2f899adb67b34bb05894bef23f7a52
SSDEEP
49152:dViZi2db5FchAWK9o5KsxMh4MjM78wVse4TDgT+K/wXUP:eoCvsa4p7UeXT+YwXUP
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\f\save\bin\client\master\five\release\dbg\CitizenFX_SubProcess_game.pdb
CreateFileW
GetFileAttributesW
GetFileAttributesExW
GetLastError
AddVectoredExceptionHandler
GetCurrentProcessId
ExitProcess
GetStartupInfoW
CreateFileMappingW
MapViewOfFile
GetModuleHandleW
LoadLibraryA
K32EnumProcessModules
CreateDirectoryW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
CreateMutexW
OpenMutexW
CreateThread
GetCurrentThread
GetCurrentThreadId
GetSystemTime
GetTickCount64
GetModuleFileNameW
LocalFree
SystemTimeToFileTime
VerSetConditionMask
CloseHandle
OpenThread
SuspendThread
ResumeThread
LoadLibraryW
SetThreadContext
VirtualProtect
VerifyVersionInfoW
RtlAddFunctionTable
GetModuleFileNameA
GetPrivateProfileStringW
WritePrivateProfileStringW
DeleteFileW
GetFullPathNameW
CreateProcessW
CopyFileW
GetEnvironmentVariableW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetEvent
WaitForSingleObject
CreateEventW
GetExitCodeProcess
OpenProcess
GetSystemDirectoryW
IsProcessInJob
CreateJobObjectW
AssignProcessToJobObject
SetInformationJobObject
GetPrivateProfileIntW
SetDllDirectoryW
HeapSize
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
HeapReAlloc
GetProcAddress
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetCommandLineW
GetThreadContext
GetTimeZoneInformation
FlushFileBuffers
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileSizeEx
GetConsoleCP
HeapAlloc
ReadConsoleW
GetConsoleMode
HeapFree
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetDriveTypeW
ExitThread
MultiByteToWideChar
WideCharToMultiByte
OutputDebugStringA
InitializeCriticalSectionAndSpinCount
WriteFile
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
ResetEvent
WaitForMultipleObjects
SetUnhandledExceptionFilter
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ReleaseSemaphore
CreateSemaphoreW
GetProcessId
VirtualQueryEx
FreeLibrary
FormatMessageA
CreateEventA
WaitForSingleObjectEx
FoldStringW
LCMapStringW
CompareStringW
GetDateFormatW
GetTimeFormatW
GetLocaleInfoW
GetCurrencyFormatW
GetLocaleInfoA
EnumSystemLocalesA
IsValidCodePage
IsDBCSLeadByteEx
FindClose
FindFirstFileExW
FindNextFileW
GetFileInformationByHandle
RemoveDirectoryW
SetEndOfFile
SetFilePointerEx
AreFileApisANSI
SetLastError
MoveFileExW
SwitchToThread
GetExitCodeThread
GetStringTypeW
EncodePointer
DecodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCPInfo
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
RaiseException
GetSystemInfo
VirtualQuery
LoadLibraryExA
OutputDebugStringW
GetThreadTimes
FreeLibraryAndExitThread
LoadLibraryExW
RtlPcToFileHeader
RtlUnwindEx
GetStdHandle
GetFileType
GetModuleHandleExW
WriteConsoleW
ReadFile
RtlUnwind
FindWindowW
TranslateMessage
MessageBoxW
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjects
GetTokenInformation
OpenProcessToken
RegGetValueW
RegSetKeyValueW
CommandLineToArgvW
SHCreateItemFromParsingName
SetCurrentProcessExplicitAppUserModelID
SHSetLocalizedName
ord709
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
AmdPowerXpressRequestHighPerformance
AsyncTrace
BeforeTerminateHandler
DllCanUnloadNow
NvOptimusEnablement
RemoteExceptionFunc
free
malloc
realloc
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ