Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
e3afa3a231e2563df6bcc5dbbec5921d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e3afa3a231e2563df6bcc5dbbec5921d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
e3afa3a231e2563df6bcc5dbbec5921d_JaffaCakes118
Size
1015KB
MD5
e3afa3a231e2563df6bcc5dbbec5921d
SHA1
03f9a49a53929587446fe265b0bb48401a3682ea
SHA256
121d37b77c7b8f5f455fbac1e688fb9ee220699153534b87e46a1adebe164820
SHA512
8046ae9ed9aac17c14fb1991d25237583345fa8c3e7a9d3a9aa7ef06a52b3d0dbee9a1ee654c234f9acf91b3f0a07f77c38d4ec816a325d948d6a0145f4815e5
SSDEEP
24576:dY8/7TbYcDa6BSSEkmfSRmjNr0HmO0g9miDnP9GA6YJLt:dYY7TajSENNO79FDPz6YFt
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetSystemTimeAsFileTime
GetTickCount
GetVolumeInformationW
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MulDiv
MultiByteToWideChar
OpenProcess
PulseEvent
QueryPerformanceCounter
SearchPathW
SetErrorMode
SetEvent
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
lstrcpyW
lstrlenW
VirtualAlloc
LoadLibraryA
GetStringTypeW
GetStringTypeA
LCMapStringW
GetSystemDirectoryW
GetLocaleInfoA
HeapSize
RtlUnwind
HeapReAlloc
HeapAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetStartupInfoW
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetLastError
GetFileType
CloseHandle
GetDriveTypeW
GetDiskFreeSpaceW
GetDiskFreeSpaceExW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCommandLineW
FreeLibrary
FormatMessageW
CreateThread
CreateProcessW
HeapFree
VirtualFree
HeapCreate
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
DeleteCriticalSection
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
WriteFile
ExitProcess
GetCommandLineA
CreateEventW
LCMapStringA
MessageBoxW
CallWindowProcW
CharNextW
CreateWindowExW
DefWindowProcW
DestroyWindow
LoadIconA
UnregisterClassA
TranslateMessage
DispatchMessageW
SetTimer
SendMessageTimeoutW
RegisterClassW
RegisterClassExW
PostThreadMessageW
PostMessageW
PeekMessageW
SetWindowLongW
LoadStringW
LoadCursorW
KillTimer
IsWindow
GetWindowLongW
GetMessageW
GetClassInfoExW
GetActiveWindow
FindWindowW
ExitWindowsEx
GetStockObject
PathToRegion
RegDeleteKeyW
AdjustTokenPrivileges
RegOpenKeyExA
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
wvnsprintfW
UrlGetPartA
StrStrIW
StrStrIA
StrCpyNW
StrCmpNIW
StrCmpIW
SHGetValueW
PathRemoveFileSpecW
PathIsDirectoryW
PathFindFileNameW
PathFileExistsW
PathCombineW
PathAppendW
ImmDisableIME
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ