Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
3de37e2bc559e8e43888aeaf53c3ed02_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3de37e2bc559e8e43888aeaf53c3ed02_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
3de37e2bc559e8e43888aeaf53c3ed02_JaffaCakes118
Size
245KB
MD5
3de37e2bc559e8e43888aeaf53c3ed02
SHA1
4f957229741e42357947de2dab4705952ac0a087
SHA256
13cdf8ed470ad5c0bb89d8f8661910c0d68ab7cf3895bdcdd98f7f42b191a5d1
SHA512
1ca7ca4151a2072b66cf7e545fb5926aff47d6236b9558e47036b87962a7a6feb8c33b45c4565d453558f18518064b31ca273553beb40abe21a2a39883881d17
SSDEEP
6144:tMufT6chd86r9J1ZMbVpwgaSBCtpRMCDB:aiNa6rZZeDBy1
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTickCount
GetVersionExA
GetWindowsDirectoryA
HeapAlloc
HeapFree
HeapReAlloc
InterlockedDecrement
InterlockedIncrement
LoadLibraryExA
LoadResource
LockResource
QueryPerformanceCounter
ReleaseMutex
SetCurrentDirectoryA
SetFileAttributesA
GetSystemTimeAsFileTime
Sleep
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObject
WriteFile
WritePrivateProfileSectionA
WritePrivateProfileStringA
WriteProfileStringA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
GetSystemInfo
GetSystemDirectoryA
GetStartupInfoA
GetShortPathNameA
GetProcessHeap
GetPrivateProfileStringA
GetPrivateProfileSectionA
GetPrivateProfileIntA
GetLastError
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryA
GetCommandLineA
FreeLibrary
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
ExpandEnvironmentStringsA
ExitProcess
CreateMutexA
CreateFileA
CreateDirectoryA
CopyFileA
CloseHandle
GetModuleHandleA
GetProcAddress
GetSystemDirectoryW
lstrcatW
SetUnhandledExceptionFilter
CreateFileW
wsprintfA
SetWindowTextA
MessageBoxExA
LoadStringA
IsDlgButtonChecked
GetDlgItemTextA
ExitWindowsEx
EndDialog
DialogBoxParamA
CheckDlgButton
CharPrevA
CharNextA
GetDC
ReleaseDC
MessageBoxA
GetFocus
SetCaretPos
CreateCaret
ShowCaret
HideCaret
DestroyCaret
SendMessageA
InvalidateRect
BeginPaint
PostQuitMessage
DefWindowProcA
EndPaint
TextOutA
GetTextMetricsA
GetStockObject
SelectObject
GetSidSubAuthority
FreeSid
AllocateAndInitializeSid
InitializeAcl
InitializeSecurityDescriptor
InitializeSid
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
AdjustTokenPrivileges
AddAccessAllowedAce
RegOpenKeyW
GetSidLengthRequired
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
SHGetDesktopFolder
SHFileOperationA
SHChangeNotify
ShellExecuteExA
CoUninitialize
CoInitialize
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
_vsnprintf
exit
__set_app_type
malloc
free
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ