Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
f67045329a5e10b9329d4de8c7c15d92_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f67045329a5e10b9329d4de8c7c15d92_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
f67045329a5e10b9329d4de8c7c15d92_JaffaCakes118
Size
1.2MB
MD5
f67045329a5e10b9329d4de8c7c15d92
SHA1
9023b108989b61223c9dc23a8fb1ef7cd82ea66b
SHA256
a877748c5a561feb45f946d30223e1a309902b5a05c8574a0c3e906f6cf2ccb1
SHA512
db405cb9cc80116134a77bf4b022f5b3261fce583e7f8fd4e9f3f5f1a86f9a05542a58a500f560657f14af19edd935d04e26158852a41dce0ca712a2011b79fe
SSDEEP
24576:x4N7MW5XdyJzJhJwvLdoV8J7QWaJbS5luKUGhzvTxr:xLW5AJheDdoVcZKbMluhG3r
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetPrivateProfileStructW
GetProcAddress
GetProcessHeap
GetProcessVersion
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetVersionExW
GetWindowsDirectoryW
GetWriteWatch
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedExchange
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
GetFileType
LocalShrink
MapViewOfFile
MoveFileExW
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
ReadFile
ReadProcessMemory
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesW
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpyW
LoadLibraryW
VirtualAllocEx
GetFileSize
GetFileAttributesW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetConsoleCP
GetConsoleAliasesA
GetCommandLineA
GetCPInfo
GetACP
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageW
FlushFileBuffers
ExitProcess
EnterCriticalSection
DeleteFileW
DeleteCriticalSection
CreateThread
CreateFileW
CreateFileMappingW
CompareStringW
CompareStringA
LocalFree
CloseHandle
GetMenuCheckMarkDimensions
GetClipboardOwner
CharLowerA
DestroyWindow
IsWindowVisible
IsCharLowerA
IsMenu
GetWindowTextLengthA
GetSystemMetrics
IsCharAlphaA
GetDoubleClickTime
GetDialogBaseUnits
GetClipboardSequenceNumber
GetCapture
GetMenuContextHelpId
SetWindowWord
SetDlgItemTextW
MonitorFromRect
MessageBoxExW
LoadStringA
IsDialogMessageA
IMPGetIMEA
GetMenuItemInfoW
DrawStateA
DrawIcon
DdeDisconnect
DdeCreateDataHandle
DdeCmpStringHandles
ChangeDisplaySettingsExA
ArrangeIconicWindows
IsCharAlphaW
DestroyCursor
EngCreatePalette
EngDeleteClip
EngStrokeAndFillPath
GdiAlphaBlend
GdiCreateLocalMetaFilePict
GdiGetLocalDC
GdiReleaseDC
GetClipRgn
GetPath
CreateICA
OffsetViewportOrgEx
XLATEOBJ_piVector
EndDoc
GetSystemPaletteUse
StrokePath
GetFontLanguageInfo
SetMetaRgn
CreateSolidBrush
RealizePalette
CopyMetaFileA
OffsetClipRgn
AnyLinkedFonts
CancelDC
RegOpenKeyExW
RegQueryValueExA
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ