Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
12648ee152360a5482d3a57268f0e749_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
12648ee152360a5482d3a57268f0e749_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
12648ee152360a5482d3a57268f0e749_JaffaCakes118
Size
242KB
MD5
12648ee152360a5482d3a57268f0e749
SHA1
7898e2320ff2528380d50352e5657521a8da1e38
SHA256
61a3ecc3c01ac77299e9c56da1a0804c5cb7ffc8432f22b37d9a387a46a98133
SHA512
c9737bac2418d24a2d1dae225154bcb3c222f900ca8f08836995a51d5894769086ab51fc6a3144f0f00fc20967ffc52405c719cd51fc5aae58a49195689e5d4a
SSDEEP
6144:vV4KpQ0ZNZ8QMgOAFqUu7FqQACexn8mYBmx5a0IB+9S:vVjZNZlOyqB7szC4Imx1s+9S
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Dev\Tin7\InstallDir\vc80-win32u\Loader.pdb
HeapAlloc
HeapFree
OutputDebugStringA
lstrcpynW
UnmapViewOfFile
MultiByteToWideChar
MapViewOfFile
CloseHandle
CreateFileMappingW
GetFileSize
CreateFileW
lstrlenW
GetCommandLineW
ExitProcess
Sleep
DeleteFileW
SetFileAttributesW
GetFileAttributesW
FreeLibrary
GetProcAddress
LoadLibraryW
GetTempPathW
GetModuleHandleW
GetLastError
GetModuleFileNameW
GetCurrentProcessId
GetProcessHeap
ReadFile
WriteFile
SetFileTime
SetFilePointer
MessageBoxA
wvsprintfA
wsprintfW
PostMessageW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ