Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
3e400810f87d7db912844444589118d4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e400810f87d7db912844444589118d4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
3e400810f87d7db912844444589118d4_JaffaCakes118
Size
304KB
MD5
3e400810f87d7db912844444589118d4
SHA1
6d25cb68e290c58b47d9a2b9b90b04ba416a4538
SHA256
4c23116aabafe37658e167b16691f69e8cc2994cc20c532b8b90ebfc17f1ab7d
SHA512
d8361e38bf9a1173a60fb114bd6438fd8982cc5904a16ff110a1158bf0fd0431b2d1c24c4167253ec46408ce36091109093168f767423d95f5eb2d3281382eb1
SSDEEP
6144:PVMBXkDhNVLxi86dVSXm2q7yzuIVrdmbian+4HNy/Sm6mrT7:dMGhLx+dF2q7yfEian+4mSmR7
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
EnumResourceLanguagesW
EnumUILanguagesW
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlushInstructionCache
FormatMessageW
FreeLibrary
FreeResource
GetACP
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceExW
GetDriveTypeW
GetFileAttributesW
GetFileSize
GetFullPathNameW
GetLastError
GetLocaleInfoW
GetLongPathNameW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetNumberFormatW
GetProfileIntW
GetShortPathNameW
GetStartupInfoA
GetTempFileNameW
GetTempPathW
GetTickCount
GetUserDefaultUILanguage
GetVersionExW
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
CreateMutexW
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFree
LockResource
MapViewOfFile
MoveFileW
MulDiv
MultiByteToWideChar
OpenFileMappingA
QueryPerformanceCounter
ReleaseMutex
SetEnvironmentVariableW
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SleepEx
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynA
lstrcpynW
lstrlenA
lstrlenW
CreateFileW
CreateFileMappingA
CreateEventW
CreateDirectoryW
CopyFileW
CompareStringW
CompareFileTime
CloseHandle
ReadFile
LoadLibraryExA
GetProcAddress
GlobalUnlock
VirtualAlloc
LoadCursorA
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyExA
RegEnumValueW
RegEnumKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExA
memset
_XcptFilter
__CxxFrameHandler
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_beginthreadex
_c_exit
_cexit
_controlfp
_endthreadex
_except_handler3
_exit
_ftol
_initterm
_onexit
_purecall
_snwprintf
_stricmp
_strnicmp
_vsnwprintf
_wcsicmp
_wcsnicmp
_wcsrev
_wfopen
_wfullpath
_wtoi
_wtol
calloc
ceil
ctime
exit
fclose
fgetc
fread
free
fseek
ftell
isdigit
isprint
iswctype
iswdigit
iswspace
malloc
memmove
qsort
rand
realloc
sprintf
srand
strncpy
swprintf
swscanf
time
tolower
vswprintf
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsncat
wcsncmp
wcsncpy
wcspbrk
wcsrchr
wcsstr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ