Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
fcde052ba05f266e6ec352a213a348ca_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fcde052ba05f266e6ec352a213a348ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fcde052ba05f266e6ec352a213a348ca_JaffaCakes118
Size
254KB
MD5
fcde052ba05f266e6ec352a213a348ca
SHA1
443d7b3dd1d5c5dea99bcdf70975f51f208dff1a
SHA256
6f697e9a8eadaa35b24aed8d64901b847e339e7270e2c33a88f6049cbf4c523e
SHA512
0bbc47224671ee7957ed8f364c8b854dc7e921931c12c417cb6a8dc723c4fab4324bfa9d7f63f43ba0de82294c6f9cedf2b2cdfc12253b6e6b05397aa52219ad
SSDEEP
6144:m0J/kZdicJEAf1SKFrOH7tQbsS1uQmZJJiSsTQCLs:+7TObtqskuXziW2s
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
InitializeCriticalSection
InterlockedDecrement
FlushInstructionCache
IsBadStringPtrA
IsBadStringPtrW
IsBadWritePtr
LeaveCriticalSection
LoadLibraryW
LocalFree
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
lstrcmpiW
lstrcpyW
lstrlenA
lstrlenW
DeleteCriticalSection
EnterCriticalSection
CreateMutexW
CloseHandle
GetCommandLineW
LoadLibraryA
GetProcAddress
GetSystemDirectoryA
lstrcatA
CreateFileA
InterlockedIncrement
VirtualAllocEx
GetStockObject
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
free
malloc
realloc
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE