Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
6049ed6e9745b1913c2d52f648976199_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6049ed6e9745b1913c2d52f648976199_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
6049ed6e9745b1913c2d52f648976199_JaffaCakes118
Size
537KB
MD5
6049ed6e9745b1913c2d52f648976199
SHA1
be8396ef464ee7a8e0a780e83e0264721e688717
SHA256
97c2b64b4b3ab2b4478e5b6f7fea3c597fd0cce941b38dfbbd031e15a097bb95
SHA512
b491a789f7a02e741410c41d4b17bff224b24a334a2fc33f77b3da7c6c0ea62520314b28422d21688765d56e3bd831b8ec13ecdd61db3eccc5d1e329582ae52f
SSDEEP
6144:b/L2FapyvljxykBunWM7QeQVTw+RlTFsO2i2299OJaVhyKQt9MnjzQxeTYu+xSl1:3fSlytW1eQVT3sO2iD6a+KQ01E+l1
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleW
LoadLibraryA
VirtualAlloc
GetScrollRange
IsWindowVisible
LoadCursorW
LoadBitmapA
RealGetWindowClassW
ShowWindow
GetUserObjectInformationA
RegOpenKeyA
RegQueryValueExW
SHChangeNotify
SHFileOperation
SHFreeNameMappings
SHGetFolderPathW
DragQueryPoint
ExtractIconEx
ExtractAssociatedIconExW
Shell_NotifyIconW
ShellExecuteEx
SHQueryRecycleBinW
StrRChrA
StrStrIW
_XcptFilter
__getmainargs
__initenv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_wcsicmp
exit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ