Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
56cd44e302182866548c9515c5c07135_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56cd44e302182866548c9515c5c07135_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
56cd44e302182866548c9515c5c07135_JaffaCakes118
Size
254KB
MD5
56cd44e302182866548c9515c5c07135
SHA1
5194b306703dff922ce6fe9bfc180be22b11f563
SHA256
e02b5a88ef2afa3ec9f9233bac6c941101cfa848362e9be85868009515b24d17
SHA512
853ee1a0f38f0bfb6e7ad39faa73574c903fe8edc1fa1cbe575e55952469a7b9181f740669ec75037b64fc0d78beb0bec2be64f58258f47654358f463a48619a
SSDEEP
6144:m7/kZdicJEAf1SKFrOH7tQbsS1uQmZJJiSsTQCLs:Z7TObtqskuXziW2s
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
InitializeCriticalSection
InterlockedDecrement
FlushInstructionCache
IsBadStringPtrA
IsBadStringPtrW
IsBadWritePtr
LeaveCriticalSection
LoadLibraryW
LocalFree
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
lstrcmpiW
lstrcpyW
lstrlenA
lstrlenW
DeleteCriticalSection
EnterCriticalSection
CreateMutexW
CloseHandle
GetCommandLineW
LoadLibraryA
GetProcAddress
GetSystemDirectoryA
lstrcatA
CreateFileA
InterlockedIncrement
VirtualAllocEx
GetStockObject
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
free
malloc
realloc
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE