Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
838907b76f35bf3d31b4d7088a20d6ee_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
838907b76f35bf3d31b4d7088a20d6ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
838907b76f35bf3d31b4d7088a20d6ee_JaffaCakes118
Size
231KB
MD5
838907b76f35bf3d31b4d7088a20d6ee
SHA1
86865f1fa2fc01fb031d9197da972a1ccbdfaa6e
SHA256
e3ddd84b2e20177d156520676992e381a1213f78b1a2091e9e0e2bb285ddf575
SHA512
33f5291b7db78c29ddcbdf59aa6c344e8a5bc2384cc8b30e6f18155d77b3c23014510f49cae89e2a7081d74eae2ddbb7da1782e4b40b47b2dd8c06709f6427a0
SSDEEP
6144:428Wsf82sngTWKLP65sg39NTiP0oKHTsB7jF:428tJsnAzwzTLbW
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
WriteFile
Sleep
SizeofResource
SetEndOfFile
OpenMutexA
LockResource
LoadResource
LoadLibraryA
GetSystemTime
GetProcAddress
GetCurrentProcess
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
DeleteFileA
CreateProcessA
CreateMutexA
CreateFileA
CloseHandle
VirtualProtect
GetModuleFileNameA
ExitProcess
GetKeyboardType
MessageBoxA
CharNextA
PostMessageA
MessageBoxA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegSaveKeyA
RegRestoreKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ