Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
76ad3c3c4bc2e4a8e9fcefa935ac2a3c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76ad3c3c4bc2e4a8e9fcefa935ac2a3c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
76ad3c3c4bc2e4a8e9fcefa935ac2a3c_JaffaCakes118
Size
279KB
MD5
76ad3c3c4bc2e4a8e9fcefa935ac2a3c
SHA1
7debc186445da2bd83488d6783ea69e4ddf594ae
SHA256
35bf0d1885c9ef1ae2b74f36b87592f53b020e3706812fa8fee21586aa31f928
SHA512
dca1ad9d0e086117c62ae5dbc0f60da7ebd9ce8781679b863b31677e949ee45870a82eebb217164a4f66024dba6798699bb3b75d48c7081e0299b0efbe737593
SSDEEP
6144:kYk7RsxF3BEuTP0PvdA8r1eVABpxEJPlLsiJEwpCTkSm4krO7mG:kYee0uT8Hq6eVABvuPl5URkxG
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryW
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
VirtualAlloc
RegOpenKeyExA
SHBrowseForFolderA
ExtractAssociatedIconW
SHQueryRecycleBinA
SHLoadInProc
SHGetFolderPathA
SHFileOperationA
ExtractAssociatedIconExA
ShellHookProc
SHCreateDirectoryExW
SHInvokePrinterCommandW
SHFreeNameMappings
Shell_NotifyIconA
SHGetPathFromIDList
DragQueryFileW
SHGetDataFromIDListA
DragQueryFile
SHBindToParent
DragQueryFileA
ExtractAssociatedIconA
SHGetSpecialFolderLocation
SHGetDiskFreeSpaceExA
SHQueryRecycleBinW
SHGetSpecialFolderPathW
SHGetFileInfo
SHGetMalloc
SHGetInstanceExplorer
SHGetDiskFreeSpaceExW
SHFormatDrive
DoEnvironmentSubstW
ExtractIconEx
Shell_NotifyIcon
SHGetSpecialFolderPathA
CommandLineToArgvW
DragQueryFileAorW
ShellExecuteW
ExtractAssociatedIconExW
SHGetFolderLocation
SHGetIconOverlayIndexW
SHGetFileInfoA
SHEmptyRecycleBinW
SHGetFileInfoW
SHFileOperation
DragFinish
ExtractIconW
SHGetFolderPathW
ShellExecuteA
SHGetPathFromIDListW
ExtractIconExA
SHAppBarMessage
StrChrIW
StrChrIA
StrCmpNIA
StrRChrIA
StrStrA
StrCmpNA
StrRChrA
StrRChrIW
StrRStrIW
StrCmpNW
StrCmpNIW
StrRChrW
StrRStrIA
StrChrW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ