Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a869b4f43a2ec140f909c4301be5f617_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a869b4f43a2ec140f909c4301be5f617_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a869b4f43a2ec140f909c4301be5f617_JaffaCakes118
Size
36KB
MD5
a869b4f43a2ec140f909c4301be5f617
SHA1
0f8e69cccabeba5c8076da8a3d024346b018d927
SHA256
7d7fba6a25507523f2891f174ebb9f81ac6b4231232c447d9af953cb682b4227
SHA512
f12a1eaa63ded62135d6565d97eeae3fe6d9dec442f1eb10ad9e95523892632934386b53bc91e80ab616ff5a5e81c8d3d5172c428f4c6ea90cabf408f32482a0
SSDEEP
768:vAAyQ182HSs752o7j2I3GImZQdlGizK6+BuGIpqXpqZd:py882yQ2oX2I3GNZQPGiBgXpid
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAllocEx
GetWindowsDirectoryA
LoadLibraryA
GetProcAddress
lstrlenA
CreateFileA
lstrcatA
CloseHandle
GetSystemMetrics
memcpy
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ