Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
dd2c55b030659ba383ee9bc5bf438f5e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd2c55b030659ba383ee9bc5bf438f5e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
dd2c55b030659ba383ee9bc5bf438f5e_JaffaCakes118
Size
896KB
MD5
dd2c55b030659ba383ee9bc5bf438f5e
SHA1
5b9bfc5d4b877b77bd480c342c1472e9409f6b63
SHA256
4db151037e5548c12cb6faa218e9a6adec7330ae96418bbd15c8d912f544fc73
SHA512
85bbc780be3a97c7ffd9befafdb9ac85f4d1acbbfac4e9c88a12d6e36cb425c0c2aaf0cb87103d811f69712ea55399ab5dee407b5b12601813c6a6c57780e8f2
SSDEEP
6144:JHQGTRBAGJCO4nlgcE01DyaPDOxz/6pNuwjns+t0SrCTVM39uKR/s4DmpkGjbusL:xQGlm
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
t:\ime\x64\ship\0\imeklmg.pdb
EnumWindows
GetWindowThreadProcessId
FindWindowW
PostMessageW
LoadKeyboardLayoutW
SystemParametersInfoW
EnumDesktopWindows
OpenDesktopW
GetForegroundWindow
GetClassNameW
CloseDesktop
UnloadKeyboardLayout
GetUserProfileDirectoryW
GetSidSubAuthority
GetSidSubAuthorityCount
IsValidSid
GetTokenInformation
DeregisterEventSource
ReportEventW
RegisterEventSourceW
OpenProcessToken
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegDeleteValueW
RegEnumValueW
RegQueryInfoKeyW
RegFlushKey
GetUserNameW
GetCurrentProcessId
GetFileAttributesW
lstrlenW
GetCurrentProcess
CompareStringW
CloseHandle
WriteFile
lstrlenA
SetFilePointer
CreateFileW
WideCharToMultiByte
GetModuleFileNameW
FormatMessageW
GetLastError
GetVersionExW
GetUserDefaultLCID
GetSystemDefaultLCID
WaitForSingleObject
CreateProcessW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleW
Sleep
OpenProcess
FreeLibrary
LoadLibraryW
GetTempPathW
GetTickCount
QueryPerformanceCounter
VirtualProtect
GetCurrentThreadId
ExpandEnvironmentStringsW
LeaveCriticalSection
GetSystemTimeAsFileTime
GetProcessHeap
HeapFree
HeapAlloc
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
InitializeCriticalSection
RtlLookupFunctionEntry
RtlCaptureContext
LocalFree
DeleteCriticalSection
EnterCriticalSection
CoInitialize
CoUninitialize
StringFromGUID2
CoCreateInstance
EnumProcessModules
GetModuleBaseNameW
_cexit
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
_exit
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
__crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
wcscpy_s
__C_specific_handler
__wgetmainargs
_amsg_exit
vswprintf_s
??_U@YAPEAX_K@Z
wcstok_s
??_V@YAXPEAX@Z
_wtoi
_wcsicmp
swscanf_s
memmove_s
wcscat_s
_encode_pointer
swprintf_s
memcpy
??2@YAPEAX_K@Z
??0exception@std@@QEAA@AEBV01@@Z
_CxxThrowException
??0exception@std@@QEAA@XZ
__CxxFrameHandler3
??1exception@std@@UEAA@XZ
?what@exception@std@@UEBAPEBDXZ
??0exception@std@@QEAA@AEBQEBD@Z
??3@YAXPEAX@Z
memset
_vsnwprintf_s
wcsncpy_s
wcsncat_s
_invalid_parameter_noinfo
_XcptFilter
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QEAAAEAV01@PEB_W@Z
?swap@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QEAAXAEAV12@@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QEAAAEAV01@AEBV01@@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QEAA@AEBV01@@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QEAA@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QEAA@PEB_W@Z
?size@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QEBA_KXZ
?c_str@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QEBAPEB_WXZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QEAA@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QEAA@PEBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QEBAPEBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QEAA@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QEAA@AEBV01@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ