Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
f076926c68e50235f2dea777f8b74431_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f076926c68e50235f2dea777f8b74431_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
f076926c68e50235f2dea777f8b74431_JaffaCakes118
Size
1.1MB
MD5
f076926c68e50235f2dea777f8b74431
SHA1
524e00a35a5b31851b75b9292c0c16b96a1a68f8
SHA256
2470b75ae10bd6ef7f70e7384ca4adce649e56509b0720c15ab4803ac36d28bf
SHA512
5cef632c1b8dbb8b62e80aea4e6c2bd297db6687e91bd191f0f42e6c338d6e4e9b5c5b28af92451a56458f8a8b39a6681266a9d52961d518d1c534b8ef2888fa
SSDEEP
24576:Dilf7HUexbctvDygPwXyseJkQOgmfhaXy/d3iZ:+ljHFg4SOvhai/d3iZ
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\evil\SVN\Exe\projects\arcadeyum\bin\module.runner.pdb
ResetEvent
WaitForSingleObject
Sleep
LoadResource
SizeofResource
CloseHandle
GetTickCount
CreateMutexA
OpenMutexA
CreateEventA
FindResourceA
CreateDirectoryA
RemoveDirectoryA
DeleteFileA
FindFirstFileA
SetEvent
MoveFileExA
GetVersionExA
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
InitializeCriticalSectionAndSpinCount
lstrlenA
CreateFileW
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetStringTypeW
HeapReAlloc
SetLastError
GetLastError
GetCurrentProcess
OpenProcess
LockResource
FreeResource
GetComputerNameA
FindNextFileA
GetVolumeInformationA
LCMapStringW
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetProcessHeap
GetConsoleCP
WideCharToMultiByte
DeleteCriticalSection
SetEndOfFile
GetFileType
EncodePointer
DecodePointer
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
ReadFile
GetCommandLineA
GetStdHandle
WriteFile
GetModuleFileNameW
HeapAlloc
HeapFree
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
HeapSize
InterlockedIncrement
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetConsoleMode
ReadConsoleW
SetFilePointer
SetFilePointerEx
MessageBoxA
CreateWindowExA
RegisterClassExA
GetMessageA
PostQuitMessage
TranslateMessage
DispatchMessageA
DefWindowProcA
AllocateAndInitializeSid
EqualSid
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyA
RegCloseKey
FreeSid
ord680
ShellExecuteExA
SHGetFolderPathA
CoUninitialize
CoCreateInstance
CoInitialize
VariantInit
VariantClear
SysAllocString
ord176
wnsprintfA
WinHttpReceiveResponse
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpOpenRequest
WinHttpSendRequest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ