Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
3f2b31f753ac4d2a57b6cec19f7c6ea0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f2b31f753ac4d2a57b6cec19f7c6ea0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
3f2b31f753ac4d2a57b6cec19f7c6ea0_JaffaCakes118
Size
270KB
MD5
3f2b31f753ac4d2a57b6cec19f7c6ea0
SHA1
27dee75cf149b312dcfac6c6f629c5d9c768e922
SHA256
570837ac121e1b4406574627bfd06f69363574bead9d742e15aabcbf21291dce
SHA512
a291d4b0be80dbd274331c58f17a13923f6568e202c2d7b54529566cca7e6c3fbe2888c49e05333d1137508cae2198ebde7d7c912ca2c56b609ed25e50ccdde1
SSDEEP
6144:XpTx5fkNPdnTG8fyYSlPnv8hjS+mkEokFuLtDVpKibnt:XNDkNPdThyYsPnvae+mL1ERgent
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileAttributesW
GetFileSize
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleHandleA
GetProcessHeap
GetShortPathNameW
GetStartupInfoW
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetVersionExW
GetVolumeNameForVolumeMountPointW
GetWindowsDirectoryW
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
GetDiskFreeSpaceExW
LoadResource
LocalAlloc
MapViewOfFile
MoveFileW
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
RemoveDirectoryW
ResetEvent
SetEvent
SetFileAttributesW
SetLastError
SetUnhandledExceptionFilter
SizeofResource
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
WaitForSingleObject
WriteFile
lstrcmpW
lstrcmpiA
lstrcpyW
lstrcpynW
lstrlenA
lstrlenW
GetDateFormatW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetComputerNameW
GetCommandLineW
FormatMessageW
FlushInstructionCache
FindResourceW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsW
EnterCriticalSection
DeleteFileW
DeleteCriticalSection
CreateProcessW
CreateFileW
CreateFileMappingW
CreateEventW
CloseHandle
VirtualAllocEx
LoadLibraryW
GetProcAddress
LoadLibraryExW
GetStartupInfoA
SetForegroundWindow
SetWindowLongW
SetWindowPos
SetWindowRgn
ShowWindow
SystemParametersInfoW
UnionRect
wsprintfW
wvsprintfW
SetFocus
SetCursor
SendMessageW
ReleaseDC
RegisterClassExW
PtInRect
OffsetRect
MessageBoxW
MapWindowPoints
LoadStringW
LoadImageW
LoadCursorW
IsWindow
IsChild
InvalidateRect
IntersectRect
GetWindowRect
GetWindowLongW
GetWindow
GetSystemMetrics
GetParent
GetKeyState
GetFocus
GetDesktopWindow
GetDC
GetClientRect
GetClassInfoExW
FindWindowW
ExitWindowsEx
EqualRect
EndPaint
DestroyWindow
DestroyAcceleratorTable
DefWindowProcW
CreateWindowExW
CharNextW
CallWindowProcW
AdjustWindowRectEx
LoadIconA
BeginPaint
SetWindowOrgEx
GetStockObject
SetViewportOrgEx
SetMapMode
SaveDC
RestoreDC
LPtoDP
GetDeviceCaps
DeleteMetaFile
DeleteDC
CreateRectRgnIndirect
CreateMetaFileW
CreateDCW
CloseMetaFile
SetWindowExtEx
RegCreateKeyExW
SetSecurityDescriptorDacl
SetFileSecurityW
CloseServiceHandle
FreeSid
InitializeSecurityDescriptor
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
PathAppendW
PathFindFileNameW
PathGetArgsW
PathRemoveFileSpecW
SHDeleteValueW
SHGetValueW
StrCmpIW
StrCmpNIW
StrCpyNW
StrToIntW
ChrCmpIW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ