Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
191711c6b5d26a70192b4a6877f7604c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
191711c6b5d26a70192b4a6877f7604c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
191711c6b5d26a70192b4a6877f7604c_JaffaCakes118
Size
352KB
MD5
191711c6b5d26a70192b4a6877f7604c
SHA1
f9c1729ef78c2486c3b2169c893f36831feec385
SHA256
21741cf234b06614e1cd82ea024e9e58e37a22424cada12e616650e824d7ae7c
SHA512
04cca06133fe4637a86926f173baaf9b8e90bc82b53bbaa04ef8aba23c03a9a2bce3119bcc4182eab1c5635a558627e4cd83b892299e308fcbe885e6f2b2d657
SSDEEP
6144:MzzQ9Szr2I6jIZNp0H8vIz3YX5Sze2wpchpkUJ1HxBh4kHI8:JSB6joQTKk9h1HxA8
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCommandLineW
LoadLibraryA
GetCommandLineA
CloseHandle
GetWindowsDirectoryW
GetModuleHandleA
GetProcAddress
lstrcatW
CreateFileW
VirtualAllocEx
LoadIconA
LoadCursorA
RegCloseKey
RegOpenKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ