Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
15cfe14c85d6057e6c395697f810c6e9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
15cfe14c85d6057e6c395697f810c6e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
15cfe14c85d6057e6c395697f810c6e9_JaffaCakes118
Size
324KB
MD5
15cfe14c85d6057e6c395697f810c6e9
SHA1
4d9f4d5b6255b636284b3fffb0df47ff8ce61458
SHA256
e8812ff661e375dacdf67ef5642eb9a6631c86947540019e3cc9273771e2eb82
SHA512
45c6d11f259161e6bf3068a89004502d18cc37e1f996ef6da46a15c0dd2f2c67d98234cd73080ae02285df913d27db291a36b045a7c732a226578a1a3a2f31af
SSDEEP
6144:PNur1ZTSDk36Kszjb8C13246zlODFVRv7:PN+1ZGDO6v1nxz7
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileMappingA
CreateThread
DebugBreak
DeleteFileA
DeviceIoControl
EnterCriticalSection
ExitProcess
ExitThread
ExpandEnvironmentStringsA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FormatMessageA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetModuleFileNameA
GetProcAddress
GetProcessHeap
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
CloseHandle
IsDBCSLeadByte
LoadLibraryExA
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
OpenProcess
QueryPerformanceCounter
ReadFile
SetCommTimeouts
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WideCharToMultiByte
lstrcpynA
lstrlenW
GetSystemDirectoryA
lstrcatA
CreateFileA
GetStartupInfoA
GetTickCount
VirtualAllocEx
SetClipboardViewer
SendMessageA
InvalidateRect
BeginPaint
GetClientRect
DefWindowProcA
GetDeviceCaps
AddFontResourceA
CreateFontIndirectA
RegOpenKeyExW
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE