Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
3e0be6b1c24ff39bacff7f924c0b165b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e0be6b1c24ff39bacff7f924c0b165b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
3e0be6b1c24ff39bacff7f924c0b165b_JaffaCakes118
Size
333KB
MD5
3e0be6b1c24ff39bacff7f924c0b165b
SHA1
5f49d40bb5c36297e58ec9e6127c79c356ccf348
SHA256
de1811db7569aa3209ac789af87ded95b28fc11a8def2fb067134aeb99770b7d
SHA512
4b03fce15b6a747a5abe8e1e3d809205081c339a62294722d35e178d80f70559e0f14a092b9fa81ac360c3c40847591f1ee7e8505b02772a8a3170cb0b1b62f4
SSDEEP
6144:xRdivpYrQOEFR22Lz/J8qb5bPRvjRdSO2ElZI8lHfSsxnagTbFF3b0:xRdiBkQDR2K8wbDdSO2ElZz73Tpdo
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CopyFileW
CreateFileW
CreateProcessW
CreateThread
DeleteFileW
ExitProcess
ExpandEnvironmentStringsW
FileTimeToDosDateTime
FileTimeToLocalFileTime
FormatMessageA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetSystemTimeAsFileTime
VirtualAllocEx
HeapAlloc
HeapFree
LocalAlloc
LocalFree
QueryPerformanceCounter
SetCurrentDirectoryA
SetErrorMode
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
GetTickCount
ReadFile
LoadIconA
GetSysColor
RegisterClassExA
LoadCursorA
LoadCursorW
RegOpenKeyA
memset
_XcptFilter
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_ftol
_initterm
_ltow
_wcslwr
_wfopen
_wfullpath
_wsplitpath
exit
fclose
floor
fwprintf
swprintf
wcsncpy
wcsstr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ