Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
304bedcf02a064135c89c8601135a6fb_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
304bedcf02a064135c89c8601135a6fb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
304bedcf02a064135c89c8601135a6fb_JaffaCakes118
Size
279KB
MD5
304bedcf02a064135c89c8601135a6fb
SHA1
e784d3202357c0c5bc698a50f6718b8f1cb8434d
SHA256
733887930b85b70102dab49e680c402e69c228a43bc9b87c51c9946377b6e61f
SHA512
c450187ada7f524abc6d79ca5d30861f525db6d4edf11ad72ae1fad8fff729cfec71b2caeb5f7b0796bb983ea10cfb2c74939717ab7e1e6c8be3d0b52881488a
SSDEEP
6144:PG9ZbON2uPf1ad4h3nCkiTx5f+EPWlmsdb4:PGjbfuPfzsLN5flObdk
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SizeofResource
FindResourceA
UnmapViewOfFile
FlushViewOfFile
DeleteFileA
VirtualFree
VirtualAlloc
GetModuleHandleA
lstrcpyA
GetModuleFileNameA
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
TerminateProcess
Sleep
LoadResource
SetFilePointer
SetStdHandle
HeapAlloc
HeapFree
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
WideCharToMultiByte
GetEnvironmentStringsW
GetEnvironmentStrings
FlushFileBuffers
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
GetOEMCP
GetACP
GetCPInfo
ExitProcess
LockResource
GetFileSize
CreateFileMappingA
MapViewOfFile
GetWindowsDirectoryA
CreateFileA
GetVersion
GetCommandLineA
WriteFile
GetLocalTime
CloseHandle
GetLastError
GetStartupInfoA
MultiByteToWideChar
FindWindowA
SendMessageA
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ