Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
009f6d7f8f7bd721d5377051587ec42e_JaffaCakes118.exe
Resource
win7-20231129-en
Target
009f6d7f8f7bd721d5377051587ec42e_JaffaCakes118
Size
1.0MB
MD5
009f6d7f8f7bd721d5377051587ec42e
SHA1
916c4b50cc9640d456ff7a1503c5841977caa727
SHA256
f93b8b6aedc9c13590c7eb2247c920e376ab33354e9ca4003834ab9f043006f0
SHA512
bbcb1280322f464695594dc02f71c813f229b858a091068ab7f758e49a0e08473c75a0337b3758078590afad6f2dc86a343adba2bdb505f896af814d8c8f4e3b
SSDEEP
12288:zVbaHbD19/nXEx5xuzi6AoS5qt4cW+EEFsfZdGvvOWTbL:zZ+bh9cTottW+jKZI3OWTH
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetVersion
LoadLibraryA
VirtualAlloc
VirtualFree
VirtualProtect
GetModuleHandleA
lstrcmpA
VerLanguageNameA
GetPrivateProfileStringW
lstrcpy
FindNextVolumeA
GetThreadPriority
SetTapePosition
EnumCalendarInfoExA
GetStdHandle
GetNumaHighestNodeNumber
FindResourceW
CreateIoCompletionPort
WriteProfileStringA
PulseEvent
LoadLibraryW
GetWindowDC
DisplayExitWindowsWarnings
ImpersonateDdeClientWindow
UnregisterMessagePumpHook
ValidateRect
BuildReasonArray
DdeQueryNextServer
DefRawInputProc
GetMenuInfo
LoadRemoteFonts
GetWindowTextA
GetCursor
CreateWindowExW
DrawTextA
CallMsgFilterA
GetCursorFrameInfo
RegisterLogonProcess
ToUnicode
RegisterDeviceNotificationA
CreatePopupMenu
UnlockWindowStation
TranslateAccelerator
DefMDIChildProcW
CloseClipboard
SetMenuItemInfoW
InvalidateRgn
MessageBoxExW
CopyRect
GdipTransformPoints
GdipSetPathGradientSurroundColorsWithCount
GdipAddPathClosedCurveI
GdipSetPenMode
GdipAddPathCurve2
GdipCreatePath
GdipAddPathRectangleI
GdipBitmapGetPixel
GdipGetPenStartCap
GdipSetPathGradientCenterColor
GdipGetPathGradientSurroundColorsWithCount
GdipIsVisibleRect
GdipCreateCachedBitmap
GdipGetStringFormatDigitSubstitution
GdipCreateMetafileFromStream
GdipCreateMatrix3
GdipGetFontCollectionFamilyList
GdipResetPenTransform
GdipGetPropertySize
GdipGetMetafileHeaderFromEmf
GdipCloneFont
GdipDrawBezierI
GdipCreateLineBrushFromRectWithAngleI
GdipGetAdjustableArrowCapWidth
GdipAddPathPolygon
GdipGetFamilyName
GdipAddPathStringI
GdipResetClip
SymLoadModule64
SymGetLineNext
SymMatchString
ImageAddCertificate
SymSetSearchPath
SymGetSymNext64
SymInitialize
SymGetLineFromName64
SplitSymbols
ImageGetDigestStream
ImagehlpApiVersionEx
SymGetLineFromName
ImagehlpApiVersion
ImageRvaToSection
SymGetLineFromAddr
GetImageUnusedHeaderBytes
SymGetSymFromAddr64
MapFileAndCheckSumW
SymLoadModule
SymEnumerateModules
SymFindFileInPath
SymEnumerateSymbols64
ImageLoad
ImageRemoveCertificate
BindImage
RealShellExecuteExA
StrRChrA
StrChrW
SHDestroyPropSheetExtArray
SHGetFolderPathW
SHCreateDirectoryExA
PathMakeUniqueName
ExtractIconW
SHGetMalloc
PifMgr_OpenProperties
ILRemoveLastID
SHGetRealIDL
ILFindLastID
ExtractAssociatedIconA
DragAcceptFiles
SHStartNetConnectionDialogW
StrRStrIA
SHAppBarMessage
DragQueryFileA
SHGetPathFromIDList
IsLFNDrive
SHBrowseForFolder
SHLoadNonloadedIconOverlayIdentifiers
OleUIPasteSpecialA
OleUIChangeSourceW
OleUICanConvertOrActivateAs
OleUIPromptUserA
OleUIConvertA
OleUIChangeSourceA
OleUIObjectPropertiesW
OleUIChangeIconA
OleUIObjectPropertiesA
OleUIInsertObjectW
OleUIAddVerbMenuW
OleUIEditLinksA
OleUIEditLinksW
OleUIAddVerbMenuA
OleUIBusyW
OleUIBusyA
GetSaveFileNameA
GetOpenFileNameA
ChooseColorW
ChooseFontW
ReplaceTextW
ChooseFontA
GetFileTitleA
GetFileTitleW
PrintDlgW
PageSetupDlgA
Ssync_ANSI_UNICODE_Struct_For_WOW
dwLBSubclass
PrintDlgExA
FindTextW
PageSetupDlgW
ReplaceTextA
FindTextA
LoadAlterBitmap
VerInstallFileA
VerFindFileW
GetFileVersionInfoSizeW
VerQueryValueW
VerQueryValueA
GetFileVersionInfoSizeA
VerFindFileA
GetFileVersionInfoW
CreateDispTypeInfo
VarR8Round
VarI4FromUI2
VarI1FromR8
OleIconToCursor
VarCat
VarR8Pow
VarDateFromUI2
VarDecFromDate
VarUI4FromDate
VarCmp
VarI4FromUI1
SafeArrayUnaccessData
VarDateFromI1
VarI4FromI8
CoCreateObjectInContext
OleConvertOLESTREAMToIStorage
CoTreatAsClass
OleInitialize
OleDuplicateData
GetRunningObjectTable
CoSetState
CoGetMarshalSizeMax
StgConvertVariantToProperty
CoRegisterInitializeSpy
OleCreateFromDataEx
CoCreateFreeThreadedMarshaler
CLSIDFromProgIDEx
CoSwitchCallContext
WriteClassStm
CoFreeLibrary
HGLOBAL_UserFree
HPALETTE_UserSize
OleLoadFromStream
CreateClassMoniker
CoCreateInstanceEx
IsValidIid
HMETAFILEPICT_UserSize
HGLOBAL_UserSize
StgOpenPropStg
LresultFromObject
AccessibleObjectFromPoint
AccessibleObjectFromEvent
GetOleaccVersionInfo
AccessibleChildren
GetStateTextW
CreateStdAccessibleObject
AccessibleObjectFromWindow
GetRoleTextA
DllUnregisterServer
WindowFromAccessibleObject
DllCanUnloadNow
GetStateTextA
IID_IAccessible
DeleteMonitorW
ConfigurePortW
AddPrinterConnectionW
AddPortW
AddPrinterDriverW
SetFormA
AddPrintProcessorA
StartDocPrinterW
EnumPrinterDriversA
GetFormA
SetJobW
ResetPrinterW
SetFormW
DeletePortA
GetPrinterW
StartPagePrinter
AddJobW
EnumPrintersW
EnumPrinterDataExA
DEVICEMODE
ConvertAnsiDevModeToUnicodeDevmode
SpoolerPrinterEvent
DeletePrinterIC
QueryRemoteFonts
RegisterTraceGuidsW
SetThreadToken
LsaLookupSids
LsaSetQuotasForAccount
LsaSetTrustedDomainInfoByName
LsaRemovePrivilegesFromAccount
LookupPrivilegeDisplayNameA
ElfChangeNotify
CredReadW
SetPrivateObjectSecurity
LsaGetSystemAccessAccount
GetCurrentHwProfileA
GetTraceEnableLevel
RegQueryMultipleValuesW
SetSecurityDescriptorControl
LsaQuerySecurityObject
RegEnumKeyExA
LsaGetUserName
LookupPrivilegeNameA
SystemFunction005
ElfReportEventW
FreeSid
WmiQueryGuidInformation
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ