Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
b0496e1e809903de34ec8070b029b110_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0496e1e809903de34ec8070b029b110_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b0496e1e809903de34ec8070b029b110_JaffaCakes118
Size
20KB
MD5
b0496e1e809903de34ec8070b029b110
SHA1
c6c3da7d305e59a36770403a3c10a2d337b3dafe
SHA256
29e5bbd812b92d09d0837a6e179d12e867872e910f99d4d1d7b878ed6d23c605
SHA512
ff6d8c862c623cafa904b7b3bc94f0aaabe4cd5587589daad0f36575b5a402c9b853051a1e7719636af1c1bacbd009fe69433b8cc48a14cb751705a321c36747
SSDEEP
384:V3iOoetHFbnCQeEmzIhh4WWieZWRT2tZHg:V3Xo2HFLhqUhhdeNHA
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryW
AllocateUserPhysicalPages
AreFileApisANSI
BackupSeek
Beep
CompareStringA
ContinueDebugEvent
CopyFileExA
CreateFileMappingA
CreateIoCompletionPort
CreatePipe
CreateSemaphoreA
DisableThreadLibraryCalls
DuplicateHandle
EnumLanguageGroupLocalesW
EnumResourceLanguagesA
EscapeCommFunction
FileTimeToLocalFileTime
FillConsoleOutputAttribute
FindFirstVolumeW
FindResourceA
FindVolumeClose
FindVolumeMountPointClose
FoldStringA
FoldStringW
FreeLibraryAndExitThread
GetCalendarInfoW
GetCommandLineW
GetCompressedFileSizeA
GetCurrentThread
GetExitCodeProcess
GetExitCodeThread
GetFileSize
GetLongPathNameW
GetPriorityClass
GetPrivateProfileSectionW
GetPrivateProfileStringA
GetProcessShutdownParameters
GetProfileSectionA
GetProfileStringA
GetShortPathNameA
GetShortPathNameW
GetSystemInfo
GetThreadSelectorEntry
GetUserDefaultLCID
GetUserDefaultUILanguage
GetWriteWatch
GetProcAddress
GlobalFlags
GlobalMemoryStatus
Heap32ListNext
InitAtomTable
IsBadWritePtr
IsValidLocale
LCMapStringA
LocalAlloc
LocalFree
LocalShrink
MapUserPhysicalPages
MoveFileExW
MoveFileWithProgressW
OpenMutexW
OpenWaitableTimerW
PrepareTape
QueryPerformanceFrequency
ReadDirectoryChangesW
RemoveDirectoryA
ReplaceFileW
RequestDeviceWakeup
SetComputerNameExW
SetConsoleActiveScreenBuffer
SetConsoleTitleA
SetCriticalSectionSpinCount
SetFileAttributesW
SetHandleCount
SetThreadExecutionState
SetThreadIdealProcessor
SystemTimeToTzSpecificLocalTime
TlsFree
Toolhelp32ReadProcessMemory
UnhandledExceptionFilter
VerLanguageNameW
VerifyVersionInfoW
WaitForSingleObject
WriteConsoleA
WriteConsoleInputW
WriteConsoleOutputAttribute
WriteFile
WritePrivateProfileSectionA
WriteProfileStringW
_hwrite
_lopen
_lread
lstrcmp
GlobalFindAtomW
GetModuleHandleA
memset
RegOpenKeyA
VarDecFromDate
VariantTimeToSystemTime
BstrFromVector
CreateErrorInfo
DispCallFunc
GetRecordInfoFromGuids
LPSAFEARRAY_UserMarshal
LoadRegTypeLi
OACreateTypeLib2
OaBuildVersion
OleLoadPictureEx
OleLoadPictureFile
OleLoadPicturePath
OleSavePictureFile
SafeArrayCreateVector
SafeArrayCreateVectorEx
SafeArrayGetElement
SafeArrayGetRecordInfo
SafeArraySetRecordInfo
SafeArrayUnaccessData
SafeArrayUnlock
SysAllocStringByteLen
SystemTimeToVariantTime
UnRegisterTypeLi
VARIANT_UserMarshal
VarBoolFromI1
VarBoolFromI4
VarBoolFromR4
VarBoolFromStr
VarBoolFromUI4
VarBstrCat
VarBstrFromBool
VarBstrFromI1
VarBstrFromI2
VarCyAbs
VarCyCmp
VarCyFromDate
VarCyFromI1
VarCyFromUI1
VarCySu
VarDateFromBool
VarDateFromI1
VarDecCmp
VarDecFix
VarDecFromI4
VarDecFromR8
VarDecFromStr
VarDecFromUI2
VarDecInt
VarDecNeg
VarDecRound
VarDiv
VarFormatCurrency
VarFormatFromTokens
VarI1FromBool
VarI1FromR8
VarI1FromUI1
VarI1FromUI2
VarI2FromBool
VarI2FromR4
VarI4FromI1
VarI4FromUI4
VarMod
VarMonthName
VarParseNumFromStr
VarR4FromCy
VarR4FromDisp
VarR4FromI1
VarR4FromI2
VarR4FromI4
VarR4FromR8
VarR8FromCy
VarR8FromDate
VarR8FromUI1
VarR8FromUI4
VarRound
VarTokenizeFormatString
VarUI1FromR8
VarUI2FromDec
VarUI2FromDisp
VarUI4FromDisp
VarUI4FromI1
VarUI4FromR8
VarUI4FromStr
VarXor
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ