Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
0b5c3780c43fa6c3600b6d269c579c88_JaffaCakes118.exe
Resource
win7-20240221-en
Target
0b5c3780c43fa6c3600b6d269c579c88_JaffaCakes118
Size
539KB
MD5
0b5c3780c43fa6c3600b6d269c579c88
SHA1
0af164bb5c6bb0fa0cc3f938565205be6af4b2c0
SHA256
1203de663f62a2db3e80a9b011be44723b8f6b604875132704ade922462afa77
SHA512
08b9a942ee5ac2cbab319711b7a6f6fb8169690796490f775de1ef21cf577204eced8a6a18175b2be23904293516deda484285e11967a867d576b6f99d8617d6
SSDEEP
12288:flmjtRrk8r+HAysUrjAO/VDJMeRpTcsi1BwxR+KJYYyt2y9VP4YZXCdhzTimizBh:Av8qzZ4vs9J19MQP2WCMkcvP
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHDeleteKeyA
StrStrIA
SHGetValueA
PathSetDlgItemPathA
PathRemoveFileSpecA
PathFindExtensionA
PathIsDirectoryA
PathFileExistsA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
HttpQueryInfoA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetAttemptConnect
InternetReadFile
GetCurrentProcess
RaiseException
InterlockedExchange
LocalAlloc
FormatMessageA
SetLastError
lstrlenA
OpenEventA
ExitThread
SearchPathA
MultiByteToWideChar
SystemTimeToFileTime
GetPriorityClass
SetPriorityClass
GetComputerNameA
GetSystemInfo
VirtualQueryEx
ReadProcessMemory
FileTimeToLocalFileTime
GetEnvironmentVariableA
GetSystemTime
GetFileTime
FileTimeToSystemTime
GetFileAttributesW
GetExitCodeThread
TerminateThread
ResumeThread
SuspendThread
GetSystemDirectoryA
GetShortPathNameA
RemoveDirectoryA
QueryDosDeviceA
Module32First
GetBinaryTypeA
MoveFileA
Module32Next
GetWindowsDirectoryA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetPrivateProfileIntA
GetLogicalDriveStringsA
CopyFileA
SetUnhandledExceptionFilter
CreateEventA
GetLocalTime
CreateMutexA
WinExec
GetVersionExA
MoveFileExA
EnterCriticalSection
DeleteFileA
LeaveCriticalSection
GetModuleHandleA
GetCurrentThreadId
GetCurrentProcessId
IsBadCodePtr
GetStringTypeW
GetVersion
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
Process32Next
GetTickCount
CreateThread
SetEvent
CreateProcessA
Sleep
WaitForSingleObject
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateFileA
ReadFile
CloseHandle
GetFileSize
GetLastError
GetVolumeInformationA
GetDriveTypeA
FindFirstFileA
FindNextFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FreeLibrary
GetPrivateProfileSectionA
GetPrivateProfileStringA
GetFileAttributesA
LocalFree
GetProcessHeap
HeapAlloc
HeapFree
WritePrivateProfileStringA
SetFileAttributesA
GetTempPathA
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
SetStdHandle
GetStdHandle
GetTempPathW
FindFirstFileW
FindNextFileW
FindClose
CreateDirectoryA
WideCharToMultiByte
IsBadReadPtr
PeekNamedPipe
CreateFileW
FlushViewOfFile
GetFileInformationByHandle
SetFilePointer
SetHandleCount
IsBadWritePtr
VirtualAlloc
InterlockedIncrement
InterlockedDecrement
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
lstrcpynA
GlobalUnlock
GlobalLock
lstrcmpA
GlobalFree
GlobalFlags
InitializeCriticalSection
DeleteCriticalSection
TlsAlloc
GlobalHandle
GlobalReAlloc
GlobalAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GetCPInfo
GetOEMCP
WriteFile
FlushFileBuffers
SetEndOfFile
RtlUnwind
ExitProcess
HeapReAlloc
GetFileType
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
GetACP
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetKeyState
ReleaseDC
CopyRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetWindowLongA
GetWindowLongA
GetWindow
GetForegroundWindow
GetLastActivePopup
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
DestroyWindow
DefWindowProcA
GetDlgCtrlID
GetMenuItemID
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetParent
GetTopWindow
AdjustWindowRectEx
GetFocus
DispatchMessageA
PeekMessageA
GetSysColor
MapWindowPoints
IsWindowEnabled
GetNextDlgTabItem
ToAscii
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
GetClassNameA
LoadStringA
PostQuitMessage
GetSysColorBrush
PtInRect
LoadCursorA
SetCursor
MessageBeep
KillTimer
MoveWindow
ScreenToClient
SetWindowPos
LoadMenuA
GetSubMenu
GetCursorPos
SetMenuItemInfoA
TrackPopupMenu
GetWindowTextA
SetForegroundWindow
UpdateWindow
wsprintfA
BeginPaint
FillRect
EndPaint
SetTimer
EndDialog
LoadBitmapA
GetDC
GetClientRect
SetDlgItemTextA
GetDlgItem
InvalidateRect
SetWindowTextA
ExitWindowsEx
DialogBoxParamA
ShowWindow
FindWindowA
PostMessageA
MessageBoxA
GetWindowRect
AppendMenuA
CreatePopupMenu
LoadIconA
EnableWindow
SendMessageA
DestroyMenu
CreateWindowExA
GetSystemMetrics
SetDlgItemInt
SetFocus
GetDlgItemTextA
GetKeyboardState
EnableMenuItem
Escape
ExtTextOutA
RectVisible
PtVisible
CreatePen
TextOutA
GetDeviceCaps
CreateFontA
SetTextColor
GetStockObject
SetBkColor
CreateSolidBrush
StretchBlt
DeleteObject
CreateCompatibleDC
SelectObject
GetObjectA
SetBkMode
GetClipBox
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetOpenFileNameA
RegEnumValueA
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegCreateKeyA
SetFileSecurityA
SetSecurityDescriptorDacl
DeleteAce
InitializeAcl
IsValidSecurityDescriptor
RegOpenKeyExA
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
LookupAccountSidA
RegDeleteKeyA
RegQueryInfoKeyA
AdjustTokenPrivileges
RegOpenKeyA
RegDeleteValueA
GetAce
EqualSid
AddAce
AddAccessAllowedAce
AllocateAndInitializeSid
SetEntriesInAclA
SetNamedSecurityInfoA
FreeSid
GetUserNameA
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
ExtractIconA
DragQueryFileW
DragFinish
ShellExecuteExA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
Shell_NotifyIconA
ShellExecuteA
ord17
InitCommonControlsEx
ImageList_Destroy
NetShareEnum
NetShareGetInfo
NetApiBufferFree
DocumentPropertiesA
ClosePrinter
OpenPrinterA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ