Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
b281f765bbfa7e040fad6f008ae8c04c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b281f765bbfa7e040fad6f008ae8c04c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b281f765bbfa7e040fad6f008ae8c04c_JaffaCakes118
Size
90KB
MD5
b281f765bbfa7e040fad6f008ae8c04c
SHA1
e6fb520df901dbff255f50b1e27fd246cb3099fc
SHA256
596c19f6b2a98deebcd2d3c77b271aad5146ea5e1e9b41f42021e57e8c5eff39
SHA512
d95e43c23e8d4c8fbdff62efd8960ed70a6712319ae801cb88b2e33ab6ee6e02318ae36260fd76bdd1b0e6cd6d36d2ee461b08c19cb61431ff3c70f813cc5273
SSDEEP
1536:e82cHaALkTJj65mxF8korCwG4Hl+1Ohr0KMyFlB9Q/v4Lq/swRaZ3PN6XJ+bVtvF:eP/ALkTt65s+bWmuOwKDne4Lq/Po16Xo
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
lstrlenW
lstrcpyW
VirtualAlloc
GetWindowsDirectoryA
BindIoCompletionCallback
BuildCommDCBA
CallNamedPipeW
CompareStringW
CopyFileExW
CreateDirectoryA
CreateFileA
CreatePipe
CreateProcessW
CreateTimerQueue
DeleteTimerQueueEx
DisconnectNamedPipe
DnsHostnameToComputerNameA
EnumLanguageGroupLocalesA
EnumResourceLanguagesW
EnumSystemCodePagesA
EnumUILanguagesA
FileTimeToDosDateTime
FindClose
FindResourceA
FindResourceExW
FlushFileBuffers
FoldStringA
FreeEnvironmentStringsW
FreeLibrary
FreeUserPhysicalPages
GetCPInfoExA
GetCalendarInfoA
GetConsoleAliasesLengthW
GetConsoleTitleW
GetDefaultCommConfigW
GetDiskFreeSpaceExA
GetEnvironmentStringsW
GetExitCodeThread
GetFileAttributesExA
GetFileAttributesExW
GetFileAttributesW
GetFullPathNameA
GetLocaleInfoW
GetLogicalDriveStringsA
GetLogicalDriveStringsW
GetLongPathNameW
GetMailslotInfo
GetPrivateProfileSectionW
GetWindowsDirectoryW
GetProfileStringW
GetShortPathNameA
GetSystemDefaultLCID
GetSystemTimeAdjustment
GetThreadPriority
GetThreadSelectorEntry
GetUserDefaultLangID
HeapValidate
IsSystemResumeAutomatic
LoadResource
LocalCompact
LocalLock
LockFile
Module32Next
MoveFileWithProgressA
OutputDebugStringA
Process32FirstW
PulseEvent
ReadConsoleInputW
ReadConsoleOutputAttribute
ReplaceFile
ResumeThread
RtlUnwind
ScrollConsoleScreenBufferA
SearchPathA
SetCommTimeouts
SetConsoleCP
SetConsoleCursorPosition
SetConsoleTextAttribute
SetEndOfFile
SetFilePointerEx
SetStdHandle
SetSystemPowerState
SetSystemTime
SetTapePosition
SetUnhandledExceptionFilter
SetVolumeLabelA
SetVolumeLabelW
Thread32First
Toolhelp32ReadProcessMemory
UnmapViewOfFile
VerifyVersionInfoW
VirtualProtect
WaitForSingleObject
WaitForSingleObjectEx
WinExec
WriteConsoleInputA
WriteConsoleInputW
WritePrivateProfileStringA
_lclose
GetPrivateProfileStructA
CreateFileW
OpenClipboard
OpenDesktopA
OpenInputDesktop
OpenWindowStationA
PeekMessageA
RegisterClassExA
RegisterClassW
RemovePropA
ReplyMessage
SendMessageTimeoutA
SendNotifyMessageA
SetClassWord
SetLayeredWindowAttributes
SetMenuDefaultItem
SetProcessDefaultLayout
SetRectEmpty
SetUserObjectInformationA
ShowCaret
ShowWindowAsync
TranslateAccelerator
WINNLSGetIMEHotkey
WaitForInputIdle
WinHelpA
WindowFromDC
wvsprintfA
OemToCharBuffW
NotifyWinEvent
MsgWaitForMultipleObjects
LookupIconIdFromDirectoryEx
LockSetForegroundWindow
LoadStringW
LoadMenuIndirectA
LoadAcceleratorsA
IsWindowEnabled
IsDialogMessage
IsCharAlphaW
IMPGetIMEW
GrayStringA
GetWindowModuleFileName
GetWindowInfo
GetUpdateRgn
GetTabbedTextExtentA
GetSystemMetrics
GetSubMenu
GetScrollInfo
GetPriorityClipboardFormat
GetParent
GetNextDlgTabItem
GetMessagePos
GetMenuStringW
GetMenuStringA
GetMenuBarInfo
GetKeyNameTextW
GetDesktopWindow
GetCursorPos
GetClassWord
GetClassNameA
GetAsyncKeyState
EnumThreadWindows
EnumDisplaySettingsExW
EnumDisplaySettingsA
EnableMenuItem
DrawStateA
DragDetect
DispatchMessageA
DestroyCursor
DestroyAcceleratorTable
DeregisterShellHookWindow
DefMDIChildProcA
DefFrameProcA
DdeQueryStringW
DdeQueryStringA
DdeCreateDataHandle
DdeAbandonTransaction
CreateIcon
CreateDesktopW
CreateAcceleratorTableW
CloseDesktop
ClipCursor
CheckMenuItem
CharUpperW
CharToOemBuffA
CallWindowProcW
CallWindowProcA
CallNextHookEx
CallMsgFilter
BroadcastSystemMessage
AttachThreadInput
DrawIconEx
RegOpenKeyExA
Shell_NotifyIconW
Shell_NotifyIcon
ShellExecuteW
ShellExecuteExW
ShellExecuteExA
ShellExecuteEx
ShellExecuteA
DoEnvironmentSubstA
DoEnvironmentSubstW
DragQueryFile
DragQueryFileW
ExtractAssociatedIconA
ExtractAssociatedIconExA
ExtractAssociatedIconW
ExtractIconA
ExtractIconEx
ExtractIconExA
ExtractIconExW
FindExecutableA
FindExecutableW
SHAddToRecentDocs
SHChangeNotify
ShellAboutW
SHCreateDirectoryExA
SHCreateDirectoryExW
SHEmptyRecycleBinA
SHFileOperation
SHGetDataFromIDListA
SHGetDataFromIDListW
SHGetDesktopFolder
SHGetDiskFreeSpaceExA
SHGetDiskFreeSpaceExW
SHGetFileInfo
SHGetFileInfoA
SHGetFolderLocation
SHGetFolderPathA
SHGetFolderPathW
SHGetIconOverlayIndexA
SHGetIconOverlayIndexW
SHGetMalloc
SHGetPathFromIDList
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
SHInvokePrinterCommandW
SHIsFileAvailableOffline
SHLoadInProc
SHPathPrepareForWriteW
SHQueryRecycleBinW
ShellAboutA
StrChrA
StrChrIA
StrChrW
StrCmpNA
StrRChrIA
StrRChrIW
StrRStrIA
StrStrIA
StrStrA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ