Extended Key Usages
ExtKeyUsageNetscapeServerGatedCrypto
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
f0c1ba72fb74cd78fa401f42b735c7fe_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f0c1ba72fb74cd78fa401f42b735c7fe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
f0c1ba72fb74cd78fa401f42b735c7fe_JaffaCakes118
Size
1.1MB
MD5
f0c1ba72fb74cd78fa401f42b735c7fe
SHA1
99e671c7dd48cfa6fcf043771fb63252e110076d
SHA256
706a99bd0d857fed7aa455656b14e872be952dbd1ffd82d8b3bcaca5d6ba2d56
SHA512
ef3790c7badc67ae0c6e767cc7fcc4b7e1573069caa3ea265aeead9182607296de2e5bc5827b9447a8cecc58bf9d069af5b870e187d37da32ae5177ed8e0f114
SSDEEP
24576:tYnP0MeimjbF1kpyj60g1nR79/gMx2KQdh:tCP0Jn39jURBoQdQv
ExtKeyUsageNetscapeServerGatedCrypto
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SizeofResource
GetModuleFileNameW
FindResourceW
FindResourceExW
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
GetProcAddress
GetCurrentProcess
LoadLibraryW
GetModuleFileNameA
GetModuleHandleA
GetFileAttributesA
DeleteFileW
OpenProcess
ExitProcess
TerminateProcess
ReadProcessMemory
GetThreadContext
ResumeThread
WaitForDebugEvent
ContinueDebugEvent
WaitForSingleObject
CloseHandle
GetModuleHandleW
GetStartupInfoW
GetCommandLineA
GetCommandLineW
GetTempPathW
GetTempFileNameW
GetVersionExW
LoadResource
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
InitializeCriticalSectionAndSpinCount
WriteFile
ReadFile
SetFilePointer
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
GetFileAttributesW
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetStringTypeW
RaiseException
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
OutputDebugStringW
Sleep
GetLastError
LockResource
FreeConsole
InterlockedDecrement
LoadLibraryExW
SetFilePointerEx
GetConsoleMode
SetEndOfFile
ReadConsoleW
GetConsoleCP
FlushFileBuffers
GetOEMCP
GetACP
WriteConsoleW
SetStdHandle
LocalFree
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetCurrentThreadId
GetModuleHandleExW
AreFileApisANSI
GetStdHandle
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
wsprintfW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetUserNameA
CoSetProxyBlanket
CoInitializeEx
CoUninitialize
CoCreateInstance
CoInitializeSecurity
SysAllocStringByteLen
SysStringByteLen
SysFreeString
VariantClear
PathFindFileNameW
StrStrIA
StrStrIW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ