Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
f475fe2309c88baec7c212cce34b9ba6_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f475fe2309c88baec7c212cce34b9ba6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
f475fe2309c88baec7c212cce34b9ba6_JaffaCakes118
Size
1003KB
MD5
f475fe2309c88baec7c212cce34b9ba6
SHA1
c359d25a62776f6adb7cbbb7accec0eb3d6b1dcf
SHA256
16d6b5df047d7870a6d88372b0a8518503002437c5e3543407ed8360a919956f
SHA512
659142e75ef3a2debae76227c15e2ead4be43958db867871f302ae2b4745a29420f23e822a12a8788540bdf54a72397477d5c72f79011f6981632209457d1a03
SSDEEP
12288:MfctPt9j/+H+UBckCQOxr84txzymIBWKelgEFHldtbyUz:MfcRrj+H+Uj/wTxzyBBmJFV
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\b\build\slave\win\build\src\out\Release\setup.exe.pdb
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ntohl
UrlCanonicalizeW
SHStrDupW
GetSidSubAuthority
GetSidSubAuthorityCount
RegEnumValueA
SystemFunction036
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
ConvertSidToStringSidW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegLoadKeyW
RegUnLoadKeyW
GetUserNameW
RegQueryValueExW
RegSetValueExW
GetFileSecurityW
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExW
RegCloseKey
CreateProcessAsUserW
GetTokenInformation
EnumSystemLocalesW
HeapSize
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetACP
GetOEMCP
GetTimeZoneInformation
WriteConsoleW
ReadConsoleW
OutputDebugStringW
GetDriveTypeW
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
GetModuleFileNameW
ExpandEnvironmentStringsW
CloseHandle
QueueUserAPC
TerminateProcess
ResumeThread
CreateProcessW
SetPriorityClass
GetPriorityClass
VirtualAllocEx
WriteProcessMemory
GetModuleHandleW
WaitForSingleObject
OpenProcess
GetFileInformationByHandle
GetExitCodeProcess
GetDateFormatW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
LockResource
SizeofResource
FindResourceW
CreateFileW
ReadFile
SetFilePointer
SetFileTime
WriteFile
VerSetConditionMask
GetShortPathNameW
VerifyVersionInfoW
GetFileAttributesW
GetFileAttributesExW
MoveFileExW
DuplicateHandle
GetCurrentThreadId
RemoveDirectoryW
GetSystemTimeAsFileTime
LocalFree
WTSGetActiveConsoleSessionId
LoadLibraryExW
CreateMutexW
GetTickCount
FormatMessageA
SetLastError
OutputDebugStringA
ReleaseMutex
DeleteFileW
GetCurrentProcessId
GetTempFileNameW
MapViewOfFile
UnmapViewOfFile
CreateDirectoryW
CopyFileW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
SetEnvironmentVariableA
CreateFileMappingW
SetCurrentDirectoryW
SetFileAttributesW
IsDebuggerPresent
GetNativeSystemInfo
GetVersionExW
GetCommandLineW
GetModuleHandleA
GetUserDefaultLangID
AssignProcessToJobObject
GetStdHandle
GetEnvironmentVariableW
FindFirstFileW
FindFirstFileExW
FindClose
FindNextFileW
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetFileSizeEx
SetEnvironmentVariableW
QueryPerformanceCounter
FileTimeToSystemTime
RtlCaptureStackBackTrace
GetLocaleInfoW
Sleep
CreateThread
LeaveCriticalSection
EnterCriticalSection
GetProcessId
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleHandleExW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetEvent
ResetEvent
WaitForMultipleObjects
RtlCaptureContext
SetUnhandledExceptionFilter
InitializeCriticalSection
ReleaseSemaphore
VirtualQueryEx
CreateSemaphoreW
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
GetStartupInfoW
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
PeekNamedPipe
FileTimeToLocalFileTime
HeapReAlloc
GetProcessHeap
HeapAlloc
ExitProcess
GetFileType
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
HeapFree
IsProcessorFeaturePresent
GetStringTypeW
MultiByteToWideChar
EncodePointer
WideCharToMultiByte
LoadLibraryExA
GetUserDefaultUILanguage
PropVariantClear
CoSetProxyBlanket
CoCreateInstance
CLSIDFromString
CoCreateGuid
CoUninitialize
CoInitializeEx
StringFromGUID2
CoTaskMemFree
SysFreeString
VariantInit
SysStringLen
SysAllocString
VariantClear
MonitorFromWindow
SetForegroundWindow
MoveWindow
DestroyWindow
CreateWindowExW
GetWindowThreadProcessId
FindWindowW
IsWindow
SendMessageTimeoutW
MessageBoxW
CharUpperW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
SetWindowLongW
GetWindowLongW
SendMessageW
GetMonitorInfoW
CreateURLMonikerEx
WTSQueryUserToken
DestroyEnvironmentBlock
CreateEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE