Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
36c42dd50f28aee2acc8a20ebd43671f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
36c42dd50f28aee2acc8a20ebd43671f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
36c42dd50f28aee2acc8a20ebd43671f_JaffaCakes118
Size
391KB
MD5
36c42dd50f28aee2acc8a20ebd43671f
SHA1
786d7e7fe330f0d9abb0f6ada971b57030353cfb
SHA256
9bf8a60e76a38b42be7d216073038851dd5d671816c7ff85bfa14a71f220302a
SHA512
e8ec093452d3faacbfaa4febbeb44f3c1a582d42f17cdbd6399507386be140e199ab947c42e8fb9f327e4c56eccd0743fe0e7a69a1f32ef4bd1a9c7aed1a2631
SSDEEP
12288:0tN/P3Zgc2IdOUWz8gYdZwuUYJGmr1xK2pE9:0tNHuiWzid+tYg4K2pA
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ImmSetCompositionFontW
ImmGetDefaultIMEWnd
ImmGetOpenStatus
ImmSetOpenStatus
ImmReleaseContext
ImmNotifyIME
ImmAssociateContextEx
ImmCreateContext
ImmGetDescriptionW
ImmGetConversionStatus
ImmGetIMCLockCount
ImmGetIMCCLockCount
ImmGenerateMessage
ImmSimulateHotKey
ImmRegisterWordA
ImmGetConversionListW
ImmGetIMCCSize
ImmGetImeMenuItemsA
ImmInstallIMEA
ImmUnregisterWordA
ImmGetCandidateListA
ImmGetGuideLineW
ImmConfigureIMEA
ImmGetVirtualKey
ImmReSizeIMCC
ImmGetConversionListA
ImmDestroyIMCC
ImmEscapeA
ImmConfigureIMEW
ImmRequestMessageA
ImmSetConversionStatus
ImmDestroySoftKeyboard
ImmSetCompositionWindow
ImmDestroyContext
ImmIsIME
ImmUnregisterWordW
ImmGetCompositionStringW
ImmLockIMC
ImmGetHotKey
ImmGetIMEFileNameW
ImmGetCompositionFontA
ImmIsUIMessageW
ImmCreateIMCC
ImmGetRegisterWordStyleA
ImmEnumInputContext
ImmUnlockIMC
ImmSetCompositionStringW
ImmGetContext
ImmAssociateContext
ImmGetCandidateWindow
ImmGetGuideLineA
ImmGetCompositionStringA
ImmRegisterWordW
ImmGetCompositionFontW
ImmGetCandidateListCountA
ImmGetStatusWindowPos
ImmUnlockIMCC
ImmSetCompositionFontA
ImmGetDescriptionA
ImmInstallIMEW
ImmCreateSoftKeyboard
GetWindowsDirectoryW
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
VirtualAlloc
SetLocalTime
Toolhelp32ReadProcessMemory
TerminateJobObject
SetConsoleActiveScreenBuffer
OpenMutexW
GetAtomNameA
lstrcmpiA
LoadLibraryExW
SetFileAttributesA
FileTimeToSystemTime
FindFirstFileA
ReadConsoleOutputA
ReadProcessMemory
FindNextChangeNotification
GetFileAttributesExW
SetLocaleInfoW
lstrcpynA
ReleaseSemaphore
GetTempFileNameW
PurgeComm
FreeEnvironmentStringsA
LocalUnlock
WriteFileEx
GetConsoleCP
Process32First
GetProcAddress
GetProfileSectionW
OpenFile
SetErrorMode
Process32Next
HeapCompact
GetStdHandle
GetProcessHeaps
GlobalFlags
IsBadReadPtr
GetSystemDefaultLCID
CloseHandle
GetCommandLineW
SetMailslotInfo
SetProcessShutdownParameters
GetCommModemStatus
CreateEventW
CreateFileMappingW
lstrcat
SetConsoleMode
GlobalUnfix
FindFirstFileExA
GetProfileIntA
FillConsoleOutputCharacterA
SetConsoleCP
GetTapeStatus
MoveFileWithProgressW
CompareFileTime
EnumLanguageGroupLocalesW
GetConsoleDisplayMode
SetComputerNameA
GetProfileStringW
CreateHardLinkW
GetStringTypeW
GetCurrentThread
IsBadStringPtrW
GetPrivateProfileSectionNamesA
GetThreadContext
CompareStringW
SetTimeZoneInformation
lstrlen
GetConsoleMode
GetCurrentConsoleFont
EnumResourceNamesA
GetLocaleInfoW
CallNamedPipeA
EnumResourceLanguagesW
BuildCommDCBA
Process32FirstW
GetLongPathNameW
GetEnvironmentStringsA
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
DeleteFileA
GetVolumePathNameW
GetSystemTimeAsFileTime
CreateMailslotW
HeapLock
GetProcessHeap
QueryDosDeviceW
Module32Next
BackupSeek
GetConsoleAliasesLengthW
CreateHardLinkA
SetEnvironmentVariableW
WriteConsoleOutputCharacterA
WinExec
EraseTape
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
GetStockObject
RegOpenKeyExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ