Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
d49d5741eaf74add5ef5c42ce24ec9c0_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d49d5741eaf74add5ef5c42ce24ec9c0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d49d5741eaf74add5ef5c42ce24ec9c0_JaffaCakes118
Size
1.0MB
MD5
d49d5741eaf74add5ef5c42ce24ec9c0
SHA1
24d5850623abb992e35e6a5ab8078bb37b7f5bd9
SHA256
fa3947358cc0351f41bc7d45055bb22231e5ccda29830dd0c98544f1762dc556
SHA512
fa25894ca0ef0451dff038abc10238ffa5cda161c5dc06f6528765d0de4c2674091011dedf9fe7c868f365582e42e44aa5fb5fb41f7aa02dd714a2be88fe72c9
SSDEEP
24576:D/7TbYcDa6BSSEkmfSRmjNr0HmO0g9miDnP9GAj61MU8Hv:D7TajSENNO79FDPze+z
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetACP
GetCPInfo
GetCPInfoExW
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetConsoleTitleA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDriveTypeW
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileSize
GetFileType
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeExW
GetStringTypeW
GetSystemDefaultLCID
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetThreadLocale
GetTickCount
GetTimeFormatW
GetUserDefaultUILanguage
GetVersionExA
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GlobalAlloc
GlobalFree
GlobalLock
GlobalReAlloc
GlobalSize
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalFree
FlushFileBuffers
OpenProcess
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
FreeEnvironmentStringsW
ReleaseSemaphore
ResetEvent
RtlUnwind
SetConsoleCtrlHandler
SetConsoleDisplayMode
SetConsoleMode
SetConsoleTextAttribute
SetConsoleTitleA
SetErrorMode
SetEvent
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetThreadLocale
SetThreadUILanguage
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcatA
lstrcatW
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpyW
lstrcpynW
lstrlenA
lstrlenW
HeapSize
IsValidCodePage
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
ExpandEnvironmentStringsW
ExitProcess
EnterCriticalSection
DuplicateHandle
DeviceIoControl
DeleteFileW
DeleteCriticalSection
CreateSemaphoreW
CreateProcessA
CreateFileW
FreeEnvironmentStringsA
ReleaseMutex
FormatMessageW
CreateEventW
MultiByteToWideChar
CloseHandle
LoadStringW
MessageBoxW
PeekMessageW
PostMessageW
PostThreadMessageW
RegisterClassExW
RegisterClassW
SendMessageTimeoutW
SetTimer
SetWindowLongW
TranslateMessage
UnregisterClassA
LoadIconA
LoadCursorW
KillTimer
IsWindow
GetWindowLongW
GetMessageW
GetClassInfoExW
GetActiveWindow
FindWindowW
ExitWindowsEx
DispatchMessageW
DestroyWindow
DefWindowProcW
CreateWindowExW
CharNextW
CallWindowProcW
PathToRegion
GetStockObject
OpenProcessToken
AdjustTokenPrivileges
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegNotifyChangeKeyValue
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
RegOpenKeyExA
LookupPrivilegeValueW
wvnsprintfW
UrlGetPartA
StrStrIW
StrStrIA
StrCpyNW
StrCmpNIW
StrCmpIW
SHGetValueW
PathRemoveFileSpecW
PathIsDirectoryW
PathFindFileNameW
PathFileExistsW
PathAppendW
PathCombineW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ