Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
8949d0781d68bc6a0ebe7e6e88c095fa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8949d0781d68bc6a0ebe7e6e88c095fa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
8949d0781d68bc6a0ebe7e6e88c095fa_JaffaCakes118
Size
215KB
MD5
8949d0781d68bc6a0ebe7e6e88c095fa
SHA1
05fd3dee3138e9b03508b5f155cc84dd024223f6
SHA256
3c93a33d7a6ae6e77e7c0c90456959c5611d8901a141d97d1a63a3b59acf87e8
SHA512
d4381610b8609fdd2e898a4e5ee56118c283576e7e5ba8eee49b6bb5f0863ffe702fb4a0e1b0d9196a94ebce11ec3bc8173897c08ce51640a1ae8d168a78698d
SSDEEP
6144:hTmQxACbQZP8tsnAXD3PzNOZPNrhedeSP4Cn:hHakayBO9bXc
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
WriteFile
WinExec
UnmapViewOfFile
SizeofResource
SetEndOfFile
OpenMutexA
MapViewOfFile
LockResource
LoadResource
LoadLibraryA
GlobalFindAtomA
GetWindowsDirectoryA
GetTempPathA
GetSystemDirectoryA
GetProcAddress
GetCurrentThreadId
GetCommandLineA
FreeResource
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
CreateMutexA
CreateFileMappingA
CreateFileA
CopyFileA
CloseHandle
LoadLibraryA
VirtualProtect
GetModuleFileNameA
ExitProcess
GetKeyboardType
MessageBoxA
CharNextA
PostMessageA
GetMessageA
MessageBoxA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ