Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
bea9e533ad93b6940a5546b29023b0b5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bea9e533ad93b6940a5546b29023b0b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
bea9e533ad93b6940a5546b29023b0b5_JaffaCakes118
Size
274KB
MD5
bea9e533ad93b6940a5546b29023b0b5
SHA1
8c558052d2e19e8a606f957304e80acecfab7893
SHA256
5c4e129f60fb17ddb1d1a29ae82bafc20779fcd09b3e7738c58bc6d184717ed2
SHA512
df1f8b9756d4b8edba063e4bda4a7889fd92d7bd43aa065a86a24520ab87ea666973560fb9f3e9d9fe08f90cc26c0bc87290c77143a2208f21aa3b37b62f40f4
SSDEEP
6144:5dNauE9lzPWzCWBW5V97bi9OD5ft6/1gGHdfam:XNDE+zCW8Jioft9GBam
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetWindowsDirectoryA
lstrcatA
CreateFileA
memcpy
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ