Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
5773594fa846740a66369fccd29dac38_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5773594fa846740a66369fccd29dac38_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
5773594fa846740a66369fccd29dac38_JaffaCakes118
Size
2.3MB
MD5
5773594fa846740a66369fccd29dac38
SHA1
7aeb3479b6bbf85f1958e5c0f4cf9e5ad289d458
SHA256
fe8414e71f7fc06ae6ed13c924ab6c5585891006829c5b8d525c902f8dd5a2fe
SHA512
f051ca2751252d258fb795f9928f7eeb7bed2d2afd1b83fbc01f3f2e29461f961a7a4d61992f14fe524eb18d898d76e72ce2596a64d4a56b4ed27ba8d6fc916f
SSDEEP
49152:Ne7uXHQenPumURlDgSU/CRhtlaBQSUddB+E881AD257w9KHugd5O4Ev0tn+TXIU4:8ugenPPeDTlY+Ib81AD25fO+Obv2+0v
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
HeapAlloc
HeapFree
GetProcessHeap
GetLastError
GetProcAddress
LoadLibraryA
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
RtlUnwind
InitializeCriticalSectionAndSpinCount
VirtualAlloc
HeapReAlloc
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ