Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
be862abfb4a2551225a52f4e04d2bda2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be862abfb4a2551225a52f4e04d2bda2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
be862abfb4a2551225a52f4e04d2bda2_JaffaCakes118
Size
1.3MB
MD5
be862abfb4a2551225a52f4e04d2bda2
SHA1
84a61f311e01ecf3f1f395a20e4088587a488e80
SHA256
d7931e0573af3f962f7e10ee48996ddf33b3491a99da031a67426825a8c2d62c
SHA512
4482e4335f64aee3f1fee29f892b788118058615c462d8c64a166912fee0e110bd00ec23fcbb6cde501d392411881bda5c096e8db93a99692134834e947b2e2b
SSDEEP
24576:LSVujyq46MrDjZiRVvSdrZVN24SH5M7k7CydR/t:uujyoyjZ0atZVBSZW76t
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetProcessHeap
GetStdHandle
HeapSize
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
GetModuleFileNameW
ExitProcess
VirtualAllocEx
IsDebuggerPresent
GetModuleHandleW
GetDC
LoadIconW
IsGUIThread
GetEnhMetaFileA
RegOpenKeyExA
RegQueryValueExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE