Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
26f00d22279e75a75517bd5ec86bd8bd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26f00d22279e75a75517bd5ec86bd8bd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
26f00d22279e75a75517bd5ec86bd8bd_JaffaCakes118
Size
20KB
MD5
26f00d22279e75a75517bd5ec86bd8bd
SHA1
06f62b68dec68dda343a9063b0f5c1fedf6906e6
SHA256
25db0aa6433b317d970135a6be6b3aea12ba2ce246ed1b787fa61482a6b7a1ed
SHA512
0659b165c070948b657332643af67d6c55b71328b2b0c5f9f8f85f83e61ee23bf72d25269d0e24187a94940c228d29a82cd141e1c71df9ca76c54648db63cf80
SSDEEP
384:+3iOouHFbnCQeEmzIhh4WWieZWcT2tZH9:+3XouHFLhqUhhdeyHd
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryW
AllocateUserPhysicalPages
AreFileApisANSI
BackupSeek
Beep
CompareStringA
ContinueDebugEvent
CopyFileExA
CreateFileMappingA
CreateIoCompletionPort
CreatePipe
CreateSemaphoreA
DisableThreadLibraryCalls
DuplicateHandle
EnumLanguageGroupLocalesW
EnumResourceLanguagesA
EscapeCommFunction
FileTimeToLocalFileTime
FillConsoleOutputAttribute
FindFirstVolumeW
FindResourceA
FindVolumeClose
FindVolumeMountPointClose
FoldStringA
FoldStringW
FreeLibraryAndExitThread
GetCalendarInfoW
GetCommandLineW
GetCompressedFileSizeA
GetCurrentThread
GetExitCodeProcess
GetExitCodeThread
GetFileSize
GetLongPathNameW
GetPriorityClass
GetPrivateProfileSectionW
GetPrivateProfileStringA
GetProcessShutdownParameters
GetProfileSectionA
GetProfileStringA
GetShortPathNameA
GetShortPathNameW
GetSystemInfo
GetThreadSelectorEntry
GetUserDefaultLCID
GetUserDefaultUILanguage
GetWriteWatch
GetProcAddress
GlobalFlags
GlobalMemoryStatus
Heap32ListNext
InitAtomTable
IsBadWritePtr
IsValidLocale
LCMapStringA
LocalAlloc
LocalFree
LocalShrink
MapUserPhysicalPages
MoveFileExW
MoveFileWithProgressW
OpenMutexW
OpenWaitableTimerW
PrepareTape
QueryPerformanceFrequency
ReadDirectoryChangesW
RemoveDirectoryA
ReplaceFileW
RequestDeviceWakeup
SetComputerNameExW
SetConsoleActiveScreenBuffer
SetConsoleTitleA
SetCriticalSectionSpinCount
SetFileAttributesW
SetHandleCount
SetThreadExecutionState
SetThreadIdealProcessor
SystemTimeToTzSpecificLocalTime
TlsFree
Toolhelp32ReadProcessMemory
UnhandledExceptionFilter
VerLanguageNameW
VerifyVersionInfoW
WaitForSingleObject
WriteConsoleA
WriteConsoleInputW
WriteConsoleOutputAttribute
WriteFile
WritePrivateProfileSectionA
WriteProfileStringW
_hwrite
_lopen
_lread
lstrcmp
GlobalFindAtomW
GetModuleHandleA
memset
RegOpenKeyA
VarDecFromDate
VariantTimeToSystemTime
BstrFromVector
CreateErrorInfo
DispCallFunc
GetRecordInfoFromGuids
LPSAFEARRAY_UserMarshal
LoadRegTypeLi
OACreateTypeLib2
OaBuildVersion
OleLoadPictureEx
OleLoadPictureFile
OleLoadPicturePath
OleSavePictureFile
SafeArrayCreateVector
SafeArrayCreateVectorEx
SafeArrayGetElement
SafeArrayGetRecordInfo
SafeArraySetRecordInfo
SafeArrayUnaccessData
SafeArrayUnlock
SysAllocStringByteLen
SystemTimeToVariantTime
UnRegisterTypeLi
VARIANT_UserMarshal
VarBoolFromI1
VarBoolFromI4
VarBoolFromR4
VarBoolFromStr
VarBoolFromUI4
VarBstrCat
VarBstrFromBool
VarBstrFromI1
VarBstrFromI2
VarCyAbs
VarCyCmp
VarCyFromDate
VarCyFromI1
VarCyFromUI1
VarCySu
VarDateFromBool
VarDateFromI1
VarDecCmp
VarDecFix
VarDecFromI4
VarDecFromR8
VarDecFromStr
VarDecFromUI2
VarDecInt
VarDecNeg
VarDecRound
VarDiv
VarFormatCurrency
VarFormatFromTokens
VarI1FromBool
VarI1FromR8
VarI1FromUI1
VarI1FromUI2
VarI2FromBool
VarI2FromR4
VarI4FromI1
VarI4FromUI4
VarMod
VarMonthName
VarParseNumFromStr
VarR4FromCy
VarR4FromDisp
VarR4FromI1
VarR4FromI2
VarR4FromI4
VarR4FromR8
VarR8FromCy
VarR8FromDate
VarR8FromUI1
VarR8FromUI4
VarRound
VarTokenizeFormatString
VarUI1FromR8
VarUI2FromDec
VarUI2FromDisp
VarUI4FromDisp
VarUI4FromI1
VarUI4FromR8
VarUI4FromStr
VarXor
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ