Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
1000e1755c79cfc70a5b5d9cd7718d8e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1000e1755c79cfc70a5b5d9cd7718d8e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
1000e1755c79cfc70a5b5d9cd7718d8e_JaffaCakes118
Size
242KB
MD5
1000e1755c79cfc70a5b5d9cd7718d8e
SHA1
2179f2f2a52c992a5645703cc1494c0f3821de05
SHA256
ef14f6b33988f3c1684074f4c6189491300224b979e6af30fabca67f56d0131a
SHA512
2e5bfe7e31fc205434436c3cab880318e2cb88d223bd9d9b7e1cc4663617c055411834f22d94f45ec1f13452c5f7a68d74d17e46d07de8554634f9bd69c5b7ee
SSDEEP
6144:6V4KpQ0ZNZ8QMgOAFqUu7FqQACexn8mYBmx5a0IB+9n:6VjZNZlOyqB7szC4Imx1s+9n
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Dev\Tin7\InstallDir\vc80-win32u\Loader.pdb
HeapAlloc
HeapFree
OutputDebugStringA
lstrcpynW
UnmapViewOfFile
MultiByteToWideChar
MapViewOfFile
CloseHandle
CreateFileMappingW
GetFileSize
CreateFileW
lstrlenW
GetCommandLineW
ExitProcess
Sleep
DeleteFileW
SetFileAttributesW
GetFileAttributesW
FreeLibrary
GetProcAddress
LoadLibraryW
GetTempPathW
GetModuleHandleW
GetLastError
GetModuleFileNameW
GetCurrentProcessId
GetProcessHeap
ReadFile
WriteFile
SetFileTime
SetFilePointer
MessageBoxA
wvsprintfA
wsprintfW
PostMessageW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ