Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
04002c3aaeaeba073f1177605fad5c17_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04002c3aaeaeba073f1177605fad5c17_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
04002c3aaeaeba073f1177605fad5c17_JaffaCakes118
Size
260KB
MD5
04002c3aaeaeba073f1177605fad5c17
SHA1
5df4c4304e95cc096be209cb4064bbbf45f68ab4
SHA256
9037fe36dafe6fadb0f39681b1422115527b0efebc620f2e506ff02d663694b7
SHA512
a84b8d97a3ce76ea77af41df025b625aae6c1ed7227d0104498299b6c631e8fef6f354680fa6c1c390f3816cdef0d824149794f4dccfdcac2b1976beb2411765
SSDEEP
6144:zdgxvtpW19sNe7L16RsZasdV2laIcTRAAbs1iGL:ixv2d8ubbPRDepL
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrcatA
GetSystemDirectoryA
ReadFile
GetStartupInfoA
CloseHandle
CompareStringW
FileTimeToSystemTime
FindClose
FindFirstFileW
FormatMessageW
GetComputerNameExW
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeW
GetLastError
GetLogicalDrives
GetModuleHandleA
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetSystemTimeAsFileTime
GetTickCount
CreateFileA
GetVolumeInformationW
HeapAlloc
HeapFree
LoadLibraryA
LocalFree
OpenProcess
QueryPerformanceCounter
ReadConsoleW
SetConsoleCursorPosition
SetConsoleMode
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
WideCharToMultiByte
WriteConsoleW
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
GetTimeFormatW
VirtualAllocEx
RegOpenKeyA
free
malloc
realloc
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE