Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
4462c5b3556c5cab5d90955b3faa19a8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4462c5b3556c5cab5d90955b3faa19a8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
4462c5b3556c5cab5d90955b3faa19a8_JaffaCakes118
Size
106KB
MD5
4462c5b3556c5cab5d90955b3faa19a8
SHA1
062f58879a40aef3cfc15e04b90cca59c8663afb
SHA256
dd529f7529692c2ebfe9da9eb7a83a7ac9d672782d93c6a82400aa3845cfb6b5
SHA512
1b3a27105a400a3194af002b9e25c422ca219fe149b2687a26a1b5ab8f3e7896bc5f51b33722a161c48d744d35b246f08b87ee5c812e8bae8bc0942276233c08
SSDEEP
1536:Ok/6k0KfteUH4g5LyJxBoXEYYa6QoGgFRyVE/vrXutgmr3t5/56:P/LEuxyA8a6O9g8p6
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CommConfigDialogA
ConvertDefaultLocale
CreateDirectoryExA
CreateEventW
CreateHardLinkA
DeleteTimerQueueTimer
EnterCriticalSection
EnumDateFormatsExA
EnumUILanguagesA
FindAtomW
FindFirstVolumeW
FindNextVolumeMountPointW
FindResourceW
FormatMessageW
FreeLibrary
FreeLibraryAndExitThread
FreeResource
GetBinaryTypeW
GetConsoleAliasExesW
GetConsoleCP
GetConsoleTitleA
GetCurrencyFormatA
GetCurrencyFormatW
GetDiskFreeSpaceExA
GetExitCodeProcess
GetNamedPipeHandleStateW
GetNamedPipeInfo
GetOEMCP
GetProcessAffinityMask
GetSystemTime
GetThreadLocale
GetVolumeInformationA
GlobalAddAtomW
GlobalFlags
GlobalGetAtomNameA
HeapCreate
HeapUnlock
LocalHandle
LocalUnlock
LockResource
CancelIo
OpenWaitableTimerA
Process32NextW
PulseEvent
QueueUserWorkItem
ReadConsoleOutputCharacterW
ReadFileScatter
ResetEvent
SetDefaultCommConfigA
SetEvent
SetHandleCount
SetLocaleInfoW
SetStdHandle
SetTapeParameters
SetThreadContext
SetVolumeLabelA
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TransmitCommChar
TryEnterCriticalSection
UnmapViewOfFile
VirtualFreeEx
WaitForSingleObject
WriteFile
WritePrivateProfileStringW
WritePrivateProfileStructW
WriteProfileSectionW
_lopen
lstrcatW
lstrcmpi
lstrcpy
lstrcpyW
lstrlenA
VirtualAlloc
CreateFileA
CreateFileW
LoadLibraryW
GetProcAddress
GetWindowsDirectoryW
GetStartupInfoA
MoveFileExA
CallNamedPipeW
RegOpenKeyExA
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ