Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
024af9966494feedce5c13f5073cb753_JaffaCakes118.exe
Resource
win7-20240221-en
Target
024af9966494feedce5c13f5073cb753_JaffaCakes118
Size
1.0MB
MD5
024af9966494feedce5c13f5073cb753
SHA1
7126bb8221480516f70b266e6370b44ede87c1fd
SHA256
07dc705da27544ca4d232515c665dff2bbbf6b0ab49fd07c602e20d6a512b4af
SHA512
91d44fa19e7ec5b1fb825fdacf2a4e0de1dbc464dcf0469418cf9ec357de1d8cf1a5955081d27a72c47af204e80062cb46f20458275b6c2655ba5d8ca8564770
SSDEEP
12288:wVbaHbD19/nXEx5xuzi6AoS5qt4cW+EEFsfZdGvvOWTbP:wZ+bh9cTottW+jKZI3OWTD
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetVersion
LoadLibraryA
VirtualAlloc
VirtualFree
VirtualProtect
GetModuleHandleA
lstrcmpA
VerLanguageNameA
GetPrivateProfileStringW
lstrcpy
FindNextVolumeA
GetThreadPriority
SetTapePosition
EnumCalendarInfoExA
GetStdHandle
GetNumaHighestNodeNumber
FindResourceW
CreateIoCompletionPort
WriteProfileStringA
PulseEvent
LoadLibraryW
GetWindowDC
DisplayExitWindowsWarnings
ImpersonateDdeClientWindow
UnregisterMessagePumpHook
ValidateRect
BuildReasonArray
DdeQueryNextServer
DefRawInputProc
GetMenuInfo
LoadRemoteFonts
GetWindowTextA
GetCursor
CreateWindowExW
DrawTextA
CallMsgFilterA
GetCursorFrameInfo
RegisterLogonProcess
ToUnicode
RegisterDeviceNotificationA
CreatePopupMenu
UnlockWindowStation
TranslateAccelerator
DefMDIChildProcW
CloseClipboard
SetMenuItemInfoW
InvalidateRgn
MessageBoxExW
CopyRect
GdipTransformPoints
GdipSetPathGradientSurroundColorsWithCount
GdipAddPathClosedCurveI
GdipSetPenMode
GdipAddPathCurve2
GdipCreatePath
GdipAddPathRectangleI
GdipBitmapGetPixel
GdipGetPenStartCap
GdipSetPathGradientCenterColor
GdipGetPathGradientSurroundColorsWithCount
GdipIsVisibleRect
GdipCreateCachedBitmap
GdipGetStringFormatDigitSubstitution
GdipCreateMetafileFromStream
GdipCreateMatrix3
GdipGetFontCollectionFamilyList
GdipResetPenTransform
GdipGetPropertySize
GdipGetMetafileHeaderFromEmf
GdipCloneFont
GdipDrawBezierI
GdipCreateLineBrushFromRectWithAngleI
GdipGetAdjustableArrowCapWidth
GdipAddPathPolygon
GdipGetFamilyName
GdipAddPathStringI
GdipResetClip
SymLoadModule64
SymGetLineNext
SymMatchString
ImageAddCertificate
SymSetSearchPath
SymGetSymNext64
SymInitialize
SymGetLineFromName64
SplitSymbols
ImageGetDigestStream
ImagehlpApiVersionEx
SymGetLineFromName
ImagehlpApiVersion
ImageRvaToSection
SymGetLineFromAddr
GetImageUnusedHeaderBytes
SymGetSymFromAddr64
MapFileAndCheckSumW
SymLoadModule
SymEnumerateModules
SymFindFileInPath
SymEnumerateSymbols64
ImageLoad
ImageRemoveCertificate
BindImage
RealShellExecuteExA
StrRChrA
StrChrW
SHDestroyPropSheetExtArray
SHGetFolderPathW
SHCreateDirectoryExA
PathMakeUniqueName
ExtractIconW
SHGetMalloc
PifMgr_OpenProperties
ILRemoveLastID
SHGetRealIDL
ILFindLastID
ExtractAssociatedIconA
DragAcceptFiles
SHStartNetConnectionDialogW
StrRStrIA
SHAppBarMessage
DragQueryFileA
SHGetPathFromIDList
IsLFNDrive
SHBrowseForFolder
SHLoadNonloadedIconOverlayIdentifiers
OleUIPasteSpecialA
OleUIChangeSourceW
OleUICanConvertOrActivateAs
OleUIPromptUserA
OleUIConvertA
OleUIChangeSourceA
OleUIObjectPropertiesW
OleUIChangeIconA
OleUIObjectPropertiesA
OleUIInsertObjectW
OleUIAddVerbMenuW
OleUIEditLinksA
OleUIEditLinksW
OleUIAddVerbMenuA
OleUIBusyW
OleUIBusyA
GetSaveFileNameA
GetOpenFileNameA
ChooseColorW
ChooseFontW
ReplaceTextW
ChooseFontA
GetFileTitleA
GetFileTitleW
PrintDlgW
PageSetupDlgA
Ssync_ANSI_UNICODE_Struct_For_WOW
dwLBSubclass
PrintDlgExA
FindTextW
PageSetupDlgW
ReplaceTextA
FindTextA
LoadAlterBitmap
VerInstallFileA
VerFindFileW
GetFileVersionInfoSizeW
VerQueryValueW
VerQueryValueA
GetFileVersionInfoSizeA
VerFindFileA
GetFileVersionInfoW
CreateDispTypeInfo
VarR8Round
VarI4FromUI2
VarI1FromR8
OleIconToCursor
VarCat
VarR8Pow
VarDateFromUI2
VarDecFromDate
VarUI4FromDate
VarCmp
VarI4FromUI1
SafeArrayUnaccessData
VarDateFromI1
VarI4FromI8
CoCreateObjectInContext
OleConvertOLESTREAMToIStorage
CoTreatAsClass
OleInitialize
OleDuplicateData
GetRunningObjectTable
CoSetState
CoGetMarshalSizeMax
StgConvertVariantToProperty
CoRegisterInitializeSpy
OleCreateFromDataEx
CoCreateFreeThreadedMarshaler
CLSIDFromProgIDEx
CoSwitchCallContext
WriteClassStm
CoFreeLibrary
HGLOBAL_UserFree
HPALETTE_UserSize
OleLoadFromStream
CreateClassMoniker
CoCreateInstanceEx
IsValidIid
HMETAFILEPICT_UserSize
HGLOBAL_UserSize
StgOpenPropStg
LresultFromObject
AccessibleObjectFromPoint
AccessibleObjectFromEvent
GetOleaccVersionInfo
AccessibleChildren
GetStateTextW
CreateStdAccessibleObject
AccessibleObjectFromWindow
GetRoleTextA
DllUnregisterServer
WindowFromAccessibleObject
DllCanUnloadNow
GetStateTextA
IID_IAccessible
DeleteMonitorW
ConfigurePortW
AddPrinterConnectionW
AddPortW
AddPrinterDriverW
SetFormA
AddPrintProcessorA
StartDocPrinterW
EnumPrinterDriversA
GetFormA
SetJobW
ResetPrinterW
SetFormW
DeletePortA
GetPrinterW
StartPagePrinter
AddJobW
EnumPrintersW
EnumPrinterDataExA
DEVICEMODE
ConvertAnsiDevModeToUnicodeDevmode
SpoolerPrinterEvent
DeletePrinterIC
QueryRemoteFonts
RegisterTraceGuidsW
SetThreadToken
LsaLookupSids
LsaSetQuotasForAccount
LsaSetTrustedDomainInfoByName
LsaRemovePrivilegesFromAccount
LookupPrivilegeDisplayNameA
ElfChangeNotify
CredReadW
SetPrivateObjectSecurity
LsaGetSystemAccessAccount
GetCurrentHwProfileA
GetTraceEnableLevel
RegQueryMultipleValuesW
SetSecurityDescriptorControl
LsaQuerySecurityObject
RegEnumKeyExA
LsaGetUserName
LookupPrivilegeNameA
SystemFunction005
ElfReportEventW
FreeSid
WmiQueryGuidInformation
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ