Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
d61f822a005dded5dd9b4561330011d3_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d61f822a005dded5dd9b4561330011d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d61f822a005dded5dd9b4561330011d3_JaffaCakes118
Size
555KB
MD5
d61f822a005dded5dd9b4561330011d3
SHA1
995cd54407e0579514fd1611261e6e053d8bb65a
SHA256
adc4d7a32c5a30b50a3fb6ffc0b8b7d3d65db304ae3fb880cfdc4a90b5a42afc
SHA512
80ad8a9553bbeb3a0d75106c7d27d014271472fd2d39b169fa1285d3b5619a273817cf5803f948221c20e660597516fd2383faaee3656f3ba64f26f7c13cf4ec
SSDEEP
12288:k3bw4e3PZKQSX6iP7QDgGTRDh+1j3ExJ2TopsTvkP1H1:k3bw4e3PZKui4gODh+hEnwCsTm1H1
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProfilesDirectoryA
HeapFree
GetProcessHeap
HeapAlloc
WriteFile
CreateProcessA
GetModuleHandleA
SetFilePointer
ReadFile
CreateDirectoryA
GetVolumeInformationA
LocalFree
MultiByteToWideChar
GetCurrentDirectoryA
SleepEx
GlobalFree
GlobalAlloc
OpenProcess
GetCurrentProcess
lstrcmpA
LoadLibraryExA
lstrcmpiA
GetFullPathNameA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
Process32Next
TerminateProcess
Process32First
CreateToolhelp32Snapshot
GetVersionExA
GetModuleFileNameA
WaitForSingleObject
GetSystemTimeAsFileTime
ExitProcess
GetCurrentProcessId
GetFileType
SetHandleCount
GetEnvironmentStringsW
SetEndOfFile
Sleep
CreateFileA
CloseHandle
lstrcpyA
lstrcatA
lstrlenA
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
SetLastError
InterlockedDecrement
ExpandEnvironmentStringsA
LoadLibraryA
GetProcAddress
FreeLibrary
GetLastError
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
lstrcpynA
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
FreeEnvironmentStringsA
GetStdHandle
HeapReAlloc
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapSize
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetTickCount
RtlUnwind
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualQuery
HeapCreate
QueryPerformanceCounter
GetClassNameA
EnumWindows
GetWindowThreadProcessId
GetShellWindow
GetUserObjectSecurity
IsWindow
IsWindowVisible
GetSecurityDescriptorOwner
IsValidSid
OpenProcessToken
GetTokenInformation
LookupAccountSidA
LookupPrivilegeValueA
AdjustTokenPrivileges
ConvertSidToStringSidA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
GetUserNameA
RegOpenKeyA
RegCloseKey
OpenSCManagerA
OpenServiceA
QueryServiceStatus
CloseServiceHandle
ShellExecuteA
SHGetFolderPathA
ord680
CoInitialize
CoUninitialize
CoCreateInstance
VariantClear
wnsprintfA
AssocQueryStringA
StrDupA
StrChrA
PathFileExistsA
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ