Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
df22d1713082002c9ed11d4933bd9e2a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df22d1713082002c9ed11d4933bd9e2a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
df22d1713082002c9ed11d4933bd9e2a_JaffaCakes118
Size
21.4MB
MD5
df22d1713082002c9ed11d4933bd9e2a
SHA1
375d7e349ad6987ed3a66bab5d154b519a18c902
SHA256
1485705728785ec7c28327e74cffdb75de84a648cc448cba4bb68937e6a967ae
SHA512
1fe9ad5321366c565dc9d6d29fbe6900978a5797d66ab2d091a0999d8a60119f049cc368b26c79009190efe0f39b7223450a26b08e47fae837cf3e7493b35f7a
SSDEEP
393216:aQURkLfaNyMAj3V67S7HgsqS+vVAXgrn7EjxWLZsnJSdKEpO7oRPKROqV2t:PfnN0SHKvVAwj7EwZsJYioRNqV2t
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\vab\Perforce\vab_vab-WX-3_6614\main\tools\partners\2144\2144InstallerEngine\Release\2144InstallerEngine.pdb
GetSystemDirectoryW
GetTempFileNameW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetDllDirectoryW
CreateDirectoryW
RemoveDirectoryW
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
CopyFileW
GetVersionExA
GetVersionExW
GetUserDefaultLangID
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetFileSize
GetCommandLineW
FreeResource
LockResource
TerminateProcess
LoadResource
SizeofResource
WriteFile
ReadFile
SetFilePointer
LoadLibraryA
FindResourceW
GetSystemDirectoryA
GetCurrentProcess
GetSystemTime
WriteConsoleW
SetStdHandle
GetStringTypeW
SetFilePointerEx
GetModuleHandleW
GetModuleFileNameW
LoadLibraryW
GetSystemInfo
CloseHandle
FindClose
Sleep
WaitForSingleObject
GetLastError
GetExitCodeProcess
ExitProcess
GetCurrentProcessId
OpenProcess
GetProcAddress
FreeLibrary
CreateFileW
GetConsoleMode
GetConsoleCP
HeapReAlloc
RtlUnwind
EncodePointer
DecodePointer
RaiseException
GetCommandLineA
HeapAlloc
HeapFree
IsDebuggerPresent
IsProcessorFeaturePresent
SetLastError
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GetStdHandle
GetModuleHandleExW
MultiByteToWideChar
HeapSize
GetProcessHeap
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
LoadLibraryExW
LCMapStringW
FlushFileBuffers
GetForegroundWindow
MessageBoxW
GetSystemMetrics
RegQueryValueExW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteExW
CoCreateGuid
StringFromGUID2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ