Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
ead6e66b68fb757ff30d70fe69866902_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead6e66b68fb757ff30d70fe69866902_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
ead6e66b68fb757ff30d70fe69866902_JaffaCakes118
Size
269KB
MD5
ead6e66b68fb757ff30d70fe69866902
SHA1
e61f5c1194e1f1fe089450a491a72a82bfc09569
SHA256
a92d010cdfab2990c50a6075f8c53cb0f729aac6b645eb7a2ac8169021b76dee
SHA512
1a71f1a49300896cbc6d3fa86141bdcdb26bc1141f4fa95af1c543e43ccb2e03e9ec0b995daa5a0a02f7058dbe7a410ae004c697a44cb6b8bd490068837deb18
SSDEEP
6144:EiNPCDQHwWKseiAzgNo6IemvG88RBQ4oPD6mrGZHXmGX7:7HqsRQgTInoXoc57
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetWindowsDirectoryA
lstrcatA
CreateFileA
LoadLibraryA
GetProcAddress
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ