Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
55f8459c2667b68a3e9dbd66aa29531c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55f8459c2667b68a3e9dbd66aa29531c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
55f8459c2667b68a3e9dbd66aa29531c_JaffaCakes118
Size
256KB
MD5
55f8459c2667b68a3e9dbd66aa29531c
SHA1
db114f437461e24382dd86bf8404083401c53559
SHA256
5e82b46b7a5c10744a201e9f91c2e47b77ad0ac27db043353219049f8d004c4a
SHA512
2e12236ea205f3736f7de86a9fe79f58df3082483c23d3859033800e09099cd096dd02cee6c5ed4b17d8e8fa554e6946c6bee675da0a20fbc3cfc23ab3ebbb90
SSDEEP
3072:KWZXeOtl3HfPkzfOwliXnBQMqZFeCd9TQR203gaagtMaFWYSx2PTvA:XX3tl3Hf8SyqmOK28aTMVYS/
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcessHeap
CreateFileW
lstrcatW
GetWindowsDirectoryW
LoadLibraryA
GetProcAddress
GetSystemInfo
AssignProcessToJobObject
BackupRead
BackupWrite
CallNamedPipeW
CloseHandle
CompareStringW
CreateDirectoryExA
CreateEventW
CreateHardLinkW
CreateSemaphoreW
DebugActiveProcess
DefineDosDeviceW
DeleteVolumeMountPointW
EnumSystemLocalesA
FileTimeToLocalFileTime
FindFirstChangeNotificationW
FindFirstFileExA
FindFirstVolumeMountPointW
FindNextVolumeMountPointW
FoldStringA
FreeResource
GetACP
GetCalendarInfoW
GetCommProperties
GetCommandLineW
GetCompressedFileSizeW
GetComputerNameW
GetConsoleAliasExesW
GetConsoleAliasW
GetCurrentProcess
GetDiskFreeSpaceExA
GetDiskFreeSpaceW
GetDriveTypeW
GetEnvironmentVariableA
GetFileAttributesA
GetFileInformationByHandle
GetLocalTime
GetLogicalDrives
GetModuleHandleA
GetNamedPipeInfo
GetPrivateProfileSectionA
GetProfileSectionW
GetShortPathNameA
GetStringTypeExA
GetSystemWindowsDirectoryA
GetTempFileNameA
GetTempPathW
GetThreadSelectorEntry
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVolumeInformationW
GetVolumePathNameA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalUnWire
GlobalUnfix
HeapAlloc
HeapWalk
InitializeCriticalSection
InterlockedExchange
InterlockedIncrement
IsValidLocale
LockFile
Module32Next
MoveFileWithProgressW
OpenJobObjectA
PurgeComm
ReadConsoleOutputA
ReadConsoleOutputCharacterA
ReadFileScatter
ResetEvent
SetCommMask
SetEvent
SetFileAttributesA
SetFilePointerEx
SetInformationJobObject
SetLocaleInfoA
SetPriorityClass
SetThreadIdealProcessor
SetThreadLocale
SetTimeZoneInformation
SetUnhandledExceptionFilter
SetupComm
SystemTimeToFileTime
UnlockFile
WaitForMultipleObjectsEx
WideCharToMultiByte
WriteFileEx
WriteProcessMemory
_lwrite
lstrcmpi
lstrcpyW
lstrcpyn
lstrcpynA
memset
InsertMenuItemW
wsprintfA
AllowSetForegroundWindow
CharLowerA
CharNextA
CharUpperA
ClientToScreen
DdeCreateStringHandleA
DeferWindowPos
DeregisterShellHookWindow
DestroyAcceleratorTable
DialogBoxParamW
EnableScrollBar
EndPaint
EnumClipboardFormats
EnumWindowStationsA
GetActiveWindow
GetAltTabInfo
GetCapture
GetClassLongW
GetClassWord
GetClientRect
GetKeyState
GetKeyboardLayoutList
GetMenuCheckMarkDimensions
GetMenuDefaultItem
GetMenuItemID
GetMenuItemRect
GetMonitorInfoW
GetUserObjectInformationA
GetWindowInfo
GetWindowTextLengthA
GetWindowThreadProcessId
GrayStringW
IsWindowEnabled
LoadCursorA
LoadIconA
LoadKeyboardLayoutW
MoveWindow
NotifyWinEvent
OffsetRect
OpenClipboard
OpenIcon
RealChildWindowFromPoint
RealGetWindowClassA
RealGetWindowClassW
RemovePropA
ScrollDC
SendIMEMessageExW
SendMessageCallbackA
SendMessageW
SetMenuContextHelpId
SetParent
SetProcessWindowStation
SetThreadDesktop
SetUserObjectInformationW
SetWindowPlacement
SetWindowRgn
ShowWindow
SwitchDesktop
ToUnicode
TrackPopupMenu
TranslateMessage
UnhookWinEvent
UnregisterDeviceNotification
VkKeyScanW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ