Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
bf0b6746a0aef69b0f634025da843a59_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf0b6746a0aef69b0f634025da843a59_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
bf0b6746a0aef69b0f634025da843a59_JaffaCakes118
Size
125KB
MD5
bf0b6746a0aef69b0f634025da843a59
SHA1
baeb38a716a8407d494ba5336202f8aa6d827802
SHA256
549d5dcd16304b16c5f2f41abe64cc312160d2e970cbde9931d3fb78bede10d5
SHA512
01b9c17d25e526573f7cce70ed72a893643dd6b5248074906b910b17d5ed58524dfa14a9e4048c3c9bd8ad2b7df641ecbb9825ca8a6e03930fcf0aab8e846558
SSDEEP
3072:Q0syi5yQe93HiziHiSaA25FtrCM8FTBqE9LMZIuwtXNAEGF3V:QVyYyQepimHiSa/qh4EB4XwtXNAEe
resource | yara_rule |
---|---|
sample | family_gh0strat |
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapFree
GetProcAddress
GetModuleHandleA
HeapAlloc
GetProcessHeap
GetLastError
lstrcatA
ExitProcess
DeleteFileA
SetFileAttributesA
MoveFileA
FreeResource
CloseHandle
lstrlenA
WriteFile
SizeofResource
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateFileA
LoadResource
FindResourceA
GetTickCount
GetTempPathA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
FreeLibrary
LoadLibraryA
ReadFile
SetFilePointer
GetModuleFileNameA
lstrcpyA
lstrcmpiA
SetLastError
GetFileAttributesA
lstrcmpA
Sleep
GetWindowsDirectoryA
WideCharToMultiByte
MultiByteToWideChar
SetUnhandledExceptionFilter
GetLocalTime
ReleaseMutex
WinExec
CreateMutexA
GetCommandLineA
GetCurrentThreadId
GetStartupInfoA
RaiseException
InterlockedExchange
LocalAlloc
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strncat
strchr
malloc
realloc
_except_handler3
_strnicmp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ