Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
5723b5eff4a66a0394978655b4aa21a4_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5723b5eff4a66a0394978655b4aa21a4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
5723b5eff4a66a0394978655b4aa21a4_JaffaCakes118
Size
61KB
MD5
5723b5eff4a66a0394978655b4aa21a4
SHA1
ab13e13d8f860a250a2a064ee7868d74bdba5490
SHA256
80b2b9074651b5673d66379ec5cc1582db2958efb87fed9e46c69e6f85772ce0
SHA512
a5ed7f4c38e20ff2cd04b7caaed3d6ec53c4653338c6ee1686753647e2c2ed9283e1e40f28a776c4f83b02b315d34057f0ac3d9a07cc76c7ed73d5800c1475a3
SSDEEP
1536:lDfm1eOg/pYcz/ZaoQI1xMjKdMjK/MMjKIMjKLU:9mILpfMoQMxMedMe/MMeIMeo
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetCommandLineW
CreateFileW
VirtualAlloc
GetWindowsDirectoryW
DeleteFileW
SetFileAttributesW
FindFirstFileW
GlobalFree
SetErrorMode
CreateFileMappingW
InterlockedIncrement
InterlockedDecrement
FormatMessageW
MulDiv
GetCurrentProcess
GetVersionExW
TerminateProcess
GetExitCodeThread
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetSystemDirectoryW
lstrcatW
SearchPathW
GetPrivateProfileStringW
lstrcmpiW
lstrcpyW
lstrcpynW
CreateHardLinkA
VirtualQueryEx
GetCurrencyFormatA
FindFirstVolumeW
SetConsoleDisplayMode
IsSystemResumeAutomatic
Process32NextW
GetTapeStatus
_llseek
ReadConsoleInputA
lstrcpy
ReadFileEx
ExpandEnvironmentStringsW
DeleteVolumeMountPointW
UnlockFileEx
GetTempFileNameA
Module32First
FreeUserPhysicalPages
CopyFileA
GetDefaultCommConfigW
CancelDeviceWakeupRequest
CreateTimerQueue
CreateRemoteThread
FatalAppExitW
CreateConsoleScreenBuffer
FoldStringW
CommConfigDialogW
SetThreadAffinityMask
MapUserPhysicalPagesScatter
WriteConsoleInputW
SetMessageWaitingIndicator
PostQueuedCompletionStatus
GetModuleHandleW
GetPrivateProfileSectionW
GetThreadSelectorEntry
GetWindowThreadProcessId
SetForegroundWindow
SendMessageTimeoutA
LoadStringA
MessageBoxA
GetStockObject
SetTextAlign
SelectObject
SetTextColor
SetBkColor
GetTextExtentPoint32W
ExtTextOutW
memcpy
_vsnprintf
__p__commode
_adjust_fdiv
__setusermatherr
__p__fmode
__getmainargs
_acmdln
exit
__set_app_type
_except_handler3
_controlfp
_initterm
_cexit
_XcptFilter
_exit
_c_exit
setlocale
mbstowcs
gets
_mbscspn
__iscsymf
_rmtmp
__unDNameEx
atoi
wcspbrk
_Getdays
putwc
_aexit_rtn
sqrt
_errno
_j1
isalpha
fopen
_findnext
_memicmp
_fpclass
vwprintf
iswcntrl
_ftol
_ftime
_setjmp
strpbrk
rename
strftime
_itoa
_CIsin
_atodbl
_stati64
_wfindfirsti64
_ultow
wcsrchr
memset
_wchmod
malloc
getenv
_ismbbprint
_endthreadex
__p__winver
_Strftime
__p__winmajor
_winminor
__unDName
_findfirsti64
_adj_fprem
strtod
__isascii
_chgsign
wcstok
_wopen
free
_snwprintf
_wfindnext
strtol
_mbsupr
_mbsspnp
__p__wenviron
_strlwr
iswgraph
_adj_fdivr_m32
__STRINGTOLD
_isnan
_wfsopen
_mbctombb
_wsetlocale
_mbclen
difftime
time
_assert
_wspawnlpe
_isatty
log10
_lrotr
fputwc
_strnicmp
_findclose
_mbsnicoll
_wutime
strtok
_mbscpy
_ui64toa
fprintf
_wstati64
_adj_fdivr_m64
_wfindfirst64
ferror
freopen
_daylight
_mbsicoll
RegOpenKeyExW
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ