Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
f99472d6ac9c15059ffc5930da403f6f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f99472d6ac9c15059ffc5930da403f6f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
f99472d6ac9c15059ffc5930da403f6f_JaffaCakes118
Size
573KB
MD5
f99472d6ac9c15059ffc5930da403f6f
SHA1
b55c332c25d3d8604db2d17e84a8130b79970847
SHA256
96dab3cefd7545dcaeb32abd737bb3c08deaa6c87c360f22b0e1fda1b9026275
SHA512
7e76d29c1e327bc25a1ed34b6676d9ba861ca388fe3f9351cd9db2dabec4b095b87e727f1545f4a02b3f51704c6ed79336fc131407d2f2dd0c567f17e4494b43
SSDEEP
12288:7V5KHD2wWq14IFaaACzdPBxyc5lkNA1gSHl2fM:umI3dXLEzSHl2E
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\workspace\{6C856BAE-F451-47E1-883F-EA341B04EAB9}\out\Release\upgrade.pdb
SetFilePointer
UnmapViewOfFile
GetFileInformationByHandle
FileTimeToSystemTime
SystemTimeToFileTime
WideCharToMultiByte
CreateThread
QueueUserWorkItem
lstrcmpiW
GetModuleFileNameW
ExitProcess
GetModuleFileNameA
WriteProcessMemory
VirtualProtect
LocalFree
FlushInstructionCache
GetCurrentDirectoryW
SetCurrentDirectoryW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
SetEndOfFile
DeleteCriticalSection
OpenMutexW
CreateDirectoryW
SetFileTime
GlobalAlloc
HeapSize
ReadConsoleW
WriteConsoleW
SetStdHandle
FindFirstFileExW
MultiByteToWideChar
DeviceIoControl
GetVolumeInformationW
GetModuleHandleW
OpenProcess
GetExitCodeProcess
MoveFileW
CreateProcessW
Process32FirstW
Process32NextW
ProcessIdToSessionId
CreateToolhelp32Snapshot
GetFileAttributesW
WaitForSingleObject
GetProcessId
SetLastError
SetUnhandledExceptionFilter
GetCurrentProcessId
GetCurrentThreadId
GetCurrentProcess
GetTickCount
GetSystemTime
GetFileSize
GetFileAttributesExW
SetFileAttributesW
FindClose
lstrlenW
FindNextFileW
FindFirstFileW
lstrcmpW
IsWow64Process
WritePrivateProfileStringW
GetTempFileNameW
VerifyVersionInfoW
FreeLibrary
VerSetConditionMask
MoveFileExW
GetProcAddress
GetLocalTime
LoadLibraryW
GetLastError
Sleep
ReleaseMutex
CreateMutexW
ReadFile
GetTempPathW
CloseHandle
DeleteFileW
CreateFileW
WriteFile
GetCommandLineW
GetCommandLineA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
GetProcessHeap
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetACP
GetStdHandle
GetModuleHandleExW
HeapFree
HeapReAlloc
HeapAlloc
LoadLibraryExW
RtlUnwind
RaiseException
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
GetCPInfo
GetLocaleInfoW
LCMapStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
DecodePointer
EncodePointer
GetStringTypeW
GetPrivateProfileStringW
GlobalFree
MessageBoxW
GetDesktopWindow
wsprintfW
CharLowerW
PostMessageW
FindWindowW
SendMessageW
ChangeServiceConfig2W
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
DeleteService
GetNamedSecurityInfoW
ControlService
StartServiceW
OpenServiceW
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
GetExplicitEntriesFromAclW
EqualSid
CreateWellKnownSid
ConvertStringSidToSidW
DeleteAce
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
OpenProcessToken
FreeSid
ConvertSidToStringSidW
GetTokenInformation
RegOpenCurrentUser
RegOpenUserClassesRoot
RegOpenKeyW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RevertToSelf
ImpersonateLoggedOnUser
CreateProcessAsUserW
GetUserNameW
DuplicateTokenEx
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
SystemFunction036
SHFileOperationW
SHCreateDirectoryExW
SHParseDisplayName
CommandLineToArgvW
ShellExecuteExW
SHGetSpecialFolderPathW
SHChangeNotify
ShellExecuteW
CoCreateInstance
CoUninitialize
CoInitialize
PropVariantClear
CoTaskMemFree
SysAllocString
SysFreeString
VerQueryValueW
GetFileVersionInfoW
SHGetValueW
SHStrDupW
SHDeleteValueW
SHDeleteKeyW
StrStrIW
StrCmpW
StrCmpIW
PathFindExtensionW
StrChrW
PathAddBackslashW
PathFindFileNameW
PathIsDirectoryW
PathFileExistsW
PathRemoveFileSpecW
SHSetValueW
MiniDumpWriteDump
UuidToStringW
UuidCreate
RpcStringFreeW
CreateEnvironmentBlock
DestroyEnvironmentBlock
HttpQueryInfoW
InternetOpenW
HttpSendRequestW
InternetCloseHandle
InternetConnectW
InternetSetOptionW
HttpOpenRequestW
HttpAddRequestHeadersW
InternetCrackUrlW
InternetReadFile
LsaGetLogonSessionData
LsaEnumerateLogonSessions
CryptBinaryToStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ