Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2d82c58785df8ddf53b0f911ebf779d8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2d82c58785df8ddf53b0f911ebf779d8_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
2d82c58785df8ddf53b0f911ebf779d8_JaffaCakes118
Size
269KB
MD5
2d82c58785df8ddf53b0f911ebf779d8
SHA1
6d3e392a14730155d3ffb383586f4304006ddf53
SHA256
1f3f8c2242c0660c1b348f4b5ec6862b07c1992428f786258060eae3a4b71479
SHA512
613a7478e0c9514a8970b71dc2eb1270edd3f8a8779401a486b0caa990c806f37dc3fd1ad931e2af0e5079acdfb61a3d694969c628dc5ec2144ccbb202dacb20
SSDEEP
6144:niNP5DQHwWKseiAzgN16IemvG88RB34oPD6mrGZHXmGaS:bHqsRQg+InoIoc0S
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetWindowsDirectoryA
lstrcatA
CreateFileA
LoadLibraryA
GetProcAddress
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ