Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a1e79943954b0553f3d3255ee276cced_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a1e79943954b0553f3d3255ee276cced_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a1e79943954b0553f3d3255ee276cced_JaffaCakes118
Size
254KB
MD5
a1e79943954b0553f3d3255ee276cced
SHA1
68997a5b6b211470ecb0ba9a7c784a6cf8b41cab
SHA256
203f0f61c9a3ae0b9d0135e504916b157acdfb45d9ad6e3f844604bccd16721f
SHA512
a72934a2165cce892aff96877cbb59527483eeeac8478ba59f43534b4ffdaa606a8dbfa07df7e8f9ecf1ef3ff5d33413c03eec35488a7d268dc65d062392fd21
SSDEEP
6144:mX/kZdicJEAf1SKFrOH7tQbsS1uQmZJJiSsTQCLs:F7TObtqskuXziW2s
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
InitializeCriticalSection
InterlockedDecrement
FlushInstructionCache
IsBadStringPtrA
IsBadStringPtrW
IsBadWritePtr
LeaveCriticalSection
LoadLibraryW
LocalFree
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
lstrcmpiW
lstrcpyW
lstrlenA
lstrlenW
DeleteCriticalSection
EnterCriticalSection
CreateMutexW
CloseHandle
GetCommandLineW
LoadLibraryA
GetProcAddress
GetSystemDirectoryA
lstrcatA
CreateFileA
InterlockedIncrement
VirtualAllocEx
GetStockObject
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
free
malloc
realloc
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE