Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
fb0f629ba817f1a1e89c6975e66b8647_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb0f629ba817f1a1e89c6975e66b8647_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fb0f629ba817f1a1e89c6975e66b8647_JaffaCakes118
Size
447KB
MD5
fb0f629ba817f1a1e89c6975e66b8647
SHA1
92ca4e6c76e10a4a0e3a969acaa36996e73444a1
SHA256
d7143a558c986f25c382da14318518690eb3fa760749e5b7033237300b88eebb
SHA512
82a651f8de7e69d2916f7251c6af2eebeb5405c3fd1816eca16e99b640795e6b5ceb9be6a3a9f3db89612a5f3ffc2fe68cb2522a7f024b3f4afdd0d89c93799f
SSDEEP
12288:Sr3ZBIRN+IfpoQ9jj8Gx7OzIEyt6RjMRg6:eZB2NhpoQ90Bpjcg6
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FindResourceA
DeleteFileA
WaitForSingleObject
CreateProcessA
CloseHandle
GetLastError
CreateFileA
GetTempFileNameA
GetTempPathA
GetStringTypeA
LCMapStringW
LoadResource
LockResource
WriteFile
SizeofResource
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
GetStringTypeW
wsprintfA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ