Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
b4790a09b20fd4db9eafb41284920e46_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4790a09b20fd4db9eafb41284920e46_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b4790a09b20fd4db9eafb41284920e46_JaffaCakes118
Size
106KB
MD5
b4790a09b20fd4db9eafb41284920e46
SHA1
d9d4bdb27a69b458e15a24b6341eb1798c40f522
SHA256
2ae8b6d50d0a0dc48bbb2b90a721b9578600ccc4d7896278d7ae7c18cc472b3e
SHA512
c1b7947edae619c36b82c46ce825dc47072aa3035bc6269c12bde6c25936dd43b555a396e7d395d42234164607aa93d80a23c35c6aea3e08ec2d206dae6b77b0
SSDEEP
1536:+kB6k0KfteUF4g5LyJxBoXEYYa6QoGlFRyVE/vrXutgmr3t5/5b:fBLE0xyA8a6OOg8pb
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CommConfigDialogA
ConvertDefaultLocale
CreateDirectoryExA
CreateEventW
CreateHardLinkA
DeleteTimerQueueTimer
EnterCriticalSection
EnumDateFormatsExA
EnumUILanguagesA
FindAtomW
FindFirstVolumeW
FindNextVolumeMountPointW
FindResourceW
FormatMessageW
FreeLibrary
FreeLibraryAndExitThread
FreeResource
GetBinaryTypeW
GetConsoleAliasExesW
GetConsoleCP
GetConsoleTitleA
GetCurrencyFormatA
GetCurrencyFormatW
GetDiskFreeSpaceExA
GetExitCodeProcess
GetNamedPipeHandleStateW
GetNamedPipeInfo
GetOEMCP
GetProcessAffinityMask
GetSystemTime
GetThreadLocale
GetVolumeInformationA
GlobalAddAtomW
GlobalFlags
GlobalGetAtomNameA
HeapCreate
HeapUnlock
LocalHandle
LocalUnlock
LockResource
CancelIo
OpenWaitableTimerA
Process32NextW
PulseEvent
QueueUserWorkItem
ReadConsoleOutputCharacterW
ReadFileScatter
ResetEvent
SetDefaultCommConfigA
SetEvent
SetHandleCount
SetLocaleInfoW
SetStdHandle
SetTapeParameters
SetThreadContext
SetVolumeLabelA
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TransmitCommChar
TryEnterCriticalSection
UnmapViewOfFile
VirtualFreeEx
WaitForSingleObject
WriteFile
WritePrivateProfileStringW
WritePrivateProfileStructW
WriteProfileSectionW
_lopen
lstrcatW
lstrcmpi
lstrcpy
lstrcpyW
lstrlenA
VirtualAlloc
CreateFileA
CreateFileW
LoadLibraryW
GetProcAddress
GetWindowsDirectoryW
GetStartupInfoA
MoveFileExA
CallNamedPipeW
RegOpenKeyExA
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ