Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
82756b1a4f3239a822d4a81e15320353_JaffaCakes118
Size
289KB
MD5
82756b1a4f3239a822d4a81e15320353
SHA1
9046965793f9d8aa6f46833c7f962d2abe229c84
SHA256
2dbba606e95d70e691ac247031683902d25f79acdff65bbba3256c34ea33da42
SHA512
351fcddf4e684127c1087fd7a519fb7c752413874a438acf40747066982dc8e6f098fbc73c034081645e63027a49e370838d57ad9fb94f685563866443856646
SSDEEP
6144:KTqx4X4g0UE7zrHE/CYXct5Bt14efUxe4UptSlHT4:4ePB/kqb5BtcE4UptWz4
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
EnumResourceLanguagesW
EnumUILanguagesW
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlushInstructionCache
FormatMessageW
FreeLibrary
FreeResource
GetACP
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceExW
GetDriveTypeW
GetFileAttributesW
GetFileSize
GetFullPathNameW
GetLastError
GetLocaleInfoW
GetLongPathNameW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetNumberFormatW
GetProfileIntW
GetShortPathNameW
GetStartupInfoA
GetTempFileNameW
GetTempPathW
GetTickCount
GetUserDefaultUILanguage
GetVersionExW
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
CreateMutexW
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFree
LockResource
MapViewOfFile
MoveFileW
MulDiv
MultiByteToWideChar
OpenFileMappingA
QueryPerformanceCounter
ReleaseMutex
SetEnvironmentVariableW
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SleepEx
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynA
lstrcpynW
lstrlenA
lstrlenW
CreateFileW
CreateFileMappingA
CreateEventW
CreateDirectoryW
CopyFileW
CompareStringW
CompareFileTime
CloseHandle
ReadFile
LoadLibraryExA
GetProcAddress
GlobalUnlock
VirtualAlloc
LoadCursorA
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyExA
RegEnumValueW
RegEnumKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExA
memset
_XcptFilter
__CxxFrameHandler
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_beginthreadex
_c_exit
_cexit
_controlfp
_endthreadex
_except_handler3
_exit
_ftol
_initterm
_onexit
_purecall
_snwprintf
_stricmp
_strnicmp
_vsnwprintf
_wcsicmp
_wcsnicmp
_wcsrev
_wfopen
_wfullpath
_wtoi
_wtol
calloc
ceil
ctime
exit
fclose
fgetc
fread
free
fseek
ftell
isdigit
isprint
iswctype
iswdigit
iswspace
malloc
memmove
qsort
rand
realloc
sprintf
srand
strncpy
swprintf
swscanf
time
tolower
vswprintf
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsncat
wcsncmp
wcsncpy
wcspbrk
wcsrchr
wcsstr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ