Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
83419057f03f656edb70bfd7739f8109_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
83419057f03f656edb70bfd7739f8109_JaffaCakes118.exe
Resource
win10v2004-20240730-en
Target
83419057f03f656edb70bfd7739f8109_JaffaCakes118
Size
242KB
MD5
83419057f03f656edb70bfd7739f8109
SHA1
924aee8f76730257d4ba45517c06211cad0f84c4
SHA256
9dc0738aa21df842d8e2d35c972226ff10594064c0adfea72024a9a674fedb88
SHA512
c825e30310cdd7c90f94dcdb37c0f7592c0f986839293cecde0d0ddcc6f883766fd5b5c81e03b2429c541cb66b7f4334fe118c512934e5d1ac411d00507dd17d
SSDEEP
6144:dV4KpQ0ZNZ8QMgOAFqUu7FqQACexn8mYBmx5a0IB+9M:dVjZNZlOyqB7szC4Imx1s+9M
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Dev\Tin7\InstallDir\vc80-win32u\Loader.pdb
HeapAlloc
HeapFree
OutputDebugStringA
lstrcpynW
UnmapViewOfFile
MultiByteToWideChar
MapViewOfFile
CloseHandle
CreateFileMappingW
GetFileSize
CreateFileW
lstrlenW
GetCommandLineW
ExitProcess
Sleep
DeleteFileW
SetFileAttributesW
GetFileAttributesW
FreeLibrary
GetProcAddress
LoadLibraryW
GetTempPathW
GetModuleHandleW
GetLastError
GetModuleFileNameW
GetCurrentProcessId
GetProcessHeap
ReadFile
WriteFile
SetFileTime
SetFilePointer
MessageBoxA
wvsprintfA
wsprintfW
PostMessageW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ