Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
3279d4be7f71bbcb8ca869b97cfe87d0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3279d4be7f71bbcb8ca869b97cfe87d0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
3279d4be7f71bbcb8ca869b97cfe87d0_JaffaCakes118
Size
377KB
MD5
3279d4be7f71bbcb8ca869b97cfe87d0
SHA1
a20bea4702418bf2f687fc6dfe6ca13f1bb61117
SHA256
67375514e8297f6b30a216ebedeb2f867d4bb81f86874850fc2ac70e42a59511
SHA512
a33f139c9d726694c88a905482748565248f7489d4130e53cb92bd82fea2f162bd7bdf37bf2c0aaa835187b8e1c4d72f41dc327d2f2442af9d800aba55ff150f
SSDEEP
6144:x6OwqYp493oxB0clrjrwcZDT+d84MLRpx8nNcJa2db/Slsm1VcZGOfzE/8VY1q:IOok4/LrbDsU9/8GPdLSl91VcASYI
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCommandLineW
LoadLibraryA
GetProcAddress
CloseHandle
GetWindowsDirectoryW
lstrcatW
CreateFileW
VirtualAllocEx
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ