Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
dd33aead3dc584b30254be1c6fa606b4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd33aead3dc584b30254be1c6fa606b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
dd33aead3dc584b30254be1c6fa606b4_JaffaCakes118
Size
431KB
MD5
dd33aead3dc584b30254be1c6fa606b4
SHA1
931e723394da190a4759ac9698a2af1aed916f8f
SHA256
3dc76ee67388486d6bab97e6f3539c38b3122d36d28ef4028df5eb9cddc6b100
SHA512
900b58fff2d8199c57944c5d1b45349791459c02d9e0d6e87fc571ae85ba8a66b4c9ab810432df148e0837348d6d6a26daf2738587c256908e319800d6589640
SSDEEP
12288:V4k3ViprBlWaQBDrIrUgbVDgmb33cEfpjUb15R9xrdYWy:V4kWg0URXd/y
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
URLDownloadToCacheFileA
SetLastError
GetLastError
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
CloseHandle
RaiseException
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
lstrlenW
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleFileNameA
Sleep
GetExitCodeProcess
WaitForSingleObject
GetModuleHandleA
LoadLibraryA
GetCurrentProcess
OpenProcess
GetVersion
CopyFileExA
GetTempPathA
ExpandEnvironmentStringsA
MoveFileExA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetModuleFileNameW
FormatMessageA
LocalFree
DeleteCriticalSection
InitializeCriticalSection
OutputDebugStringA
DebugBreak
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
lstrlenA
InterlockedDecrement
TerminateProcess
LoadLibraryW
ExitProcess
GetFileType
GetStdHandle
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetProcessHeap
SetEndOfFile
WriteConsoleW
SetHandleCount
HeapSize
HeapCreate
GetStringTypeW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
InterlockedExchange
EncodePointer
DecodePointer
HeapFree
RtlUnwind
GetSystemTimeAsFileTime
GetLocalTime
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetACP
AttachThreadInput
SetForegroundWindow
BringWindowToTop
SetFocus
GetWindowThreadProcessId
PostMessageA
MessageBoxA
GetForegroundWindow
EnumWindows
GetWindowTextA
CharLowerA
DestroyWindow
CharNextA
LoadStringA
wvsprintfA
FindWindowExA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryInfoKeyW
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
OpenProcessToken
ShellExecuteExA
SHGetFolderPathA
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
VariantClear
VarUI4FromStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ