Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
259925e889414c91171fda87b993e3e0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
259925e889414c91171fda87b993e3e0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
259925e889414c91171fda87b993e3e0_JaffaCakes118
Size
472KB
MD5
259925e889414c91171fda87b993e3e0
SHA1
3a7997d12a3e82763603b899e30efeed5283ee92
SHA256
4e2e2cc00247979599326a11d82efc2eb9b348a3e690e7ac10014a80c745a0ca
SHA512
040a5df1c65dd24f018563f8d7c25d231e9f999a54e72bdc59dbb5c526ff4d966edaf0d583b1c3ac0ded62bea5a5172fc69df2bf0ccda032ad8e79adcacf5da3
SSDEEP
12288:02vuWBn9ag2KmFg1ydntMYGShnVI3jy1pu:0Qu29Eb98asjym
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentStringsW
GetExitCodeProcess
GetFileAttributesA
GetFileInformationByHandle
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPrivateProfileIntA
GetPrivateProfileSectionA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedExchange
FreeResource
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LocalFree
LockResource
MapViewOfFile
MoveFileA
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
RtlUnwind
SetFileAttributesA
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualFree
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteFile
WritePrivateProfileSectionA
WritePrivateProfileStringA
_lclose
_llseek
_lread
_lwrite
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageA
FlushFileBuffers
FindResourceExA
FindFirstFileA
FindClose
ExitProcess
EnumResourceTypesA
EnumResourceNamesA
EnumResourceLanguagesA
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateProcessA
CreateFileMappingA
CreateFileA
CreateDirectoryA
CopyFileA
CloseHandle
IsDBCSLeadByte
VirtualAlloc
GetParent
GetSystemMetrics
GetWindowLongA
GetWindowRect
IsDlgButtonChecked
LoadStringA
MessageBeep
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
PostMessageA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetFocus
SetWindowLongA
wsprintfA
GetDlgItem
GetDC
EnableWindow
CheckRadioButton
CheckDlgButton
CharPrevA
CharNextA
CallWindowProcA
BeginPaint
GetClientRect
EndPaint
PostQuitMessage
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
GetDlgItemTextA
DeleteObject
CreateEnhMetaFileA
GetObjectA
MoveToEx
Rectangle
LineTo
CreateFontIndirectA
CloseEnhMetaFile
DeleteEnhMetaFile
GetEnhMetaFileA
PlayEnhMetaFile
GetDeviceCaps
GetStockObject
GetOpenFileNameA
GetSaveFileNameA
RegOpenKeyW
CreatePropertySheetPageA
DestroyPropertySheetPage
PropertySheetA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ