Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
563be247e0e40b84ba66dac7905a64fd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
563be247e0e40b84ba66dac7905a64fd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
563be247e0e40b84ba66dac7905a64fd_JaffaCakes118
Size
120KB
MD5
563be247e0e40b84ba66dac7905a64fd
SHA1
9c1edb42b7e3cd0c68199193d5974059145459db
SHA256
6b61c9e190d12d17a6f8a50579dd4f5d67ba2b3a8d039d5ede17f7aea3ef7678
SHA512
43abd1c143bca9b07d041890c7b7b1e4515637f04d244a9114b4228f13a9e7f4c47d8d9cba83382286d7b73f906ae0a588d2b87b6944513808225366e5010456
SSDEEP
1536:F1AOQW5jP8Z9D1lDW560YwlCBiELp3pJxQ+eBxKhqZoxgQZ71UgvxvxlaSKP:FkWgDr0YHBiEF3fxphGw71UgvRfxm
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
OpenProcessToken
CloseHandle
CopyFileW
CreateEventA
CreateProcessW
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileW
FreeConsole
FreeLibrary
GetCommandLineA
GetCommandLineW
GetCurrentProcess
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetVersionExA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
MoveFileExA
ReadFile
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
_wgetenv
_winmajor
_wsplitpath
_wtoi64
_wunlink
abort
asctime
atexit
calloc
fputc
fputs
free
fwrite
localtime
malloc
memcpy
printf
puts
realloc
signal
sprintf
strcat
strcmp
strcpy
strlen
time
vfprintf
wcscat
wcscpy
CommandLineToArgvW
FindExecutableA
EndDialog
GetWindowThreadProcessId
MoveWindow
ScreenToClient
SendDlgItemMessageA
SendMessageA
wsprintfW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE