Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
03765f4835765700827727f809f3ef1a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03765f4835765700827727f809f3ef1a_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
03765f4835765700827727f809f3ef1a_JaffaCakes118
Size
460KB
MD5
03765f4835765700827727f809f3ef1a
SHA1
5afd643ae3b4fced86c13b919e1d13d56217c318
SHA256
06a645bbd471553402266e9ce5bbfdaf5c1bce625dc28da1171abc6d1863af39
SHA512
9fa61ff8e167a607d1029b9d9df35e5da39a021c6818b89730608f36df195f192dbf874de554d1f2c298a6b601b76a49b27781c2fdd48794a4ccf8215c19a2f4
SSDEEP
12288:YQ1sW26Oaj0hS/888888888888W88888888888u2:j1kaj0Ec2
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SysFreeString
SysAllocStringLen
GetErrorInfo
SysFreeString
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopyInd
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegCloseKey
OpenThreadToken
OpenProcessToken
GetTokenInformation
FreeSid
AllocateAndInitializeSid
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegCreateKeyExW
CheckTokenMembership
LoadStringW
MessageBoxA
CharNextW
CreateWindowExW
WindowFromPoint
WaitMessage
ValidateRect
TranslateMessage
SystemParametersInfoW
ShowWindow
SetWindowPos
SetTimer
SetScrollInfo
SetParent
SetForegroundWindow
SetFocus
SetCursor
SetCapture
ScreenToClient
ReleaseDC
ReleaseCapture
RegisterClassW
PtInRect
PostQuitMessage
OffsetRect
MessageBoxW
LockWindowUpdate
LoadStringW
LoadCursorW
KillTimer
IsWindowVisible
IsWindowEnabled
IsWindow
IsIconic
InvalidateRect
InflateRect
GetWindowTextW
GetWindowRgn
GetWindowRect
GetUpdateRgn
GetSystemMetrics
GetSystemMenu
GetSysColor
GetScrollPos
GetScrollInfo
GetParent
GetWindow
GetKeyboardState
GetKeyState
GetIconInfo
GetFocus
GetDCEx
GetDC
GetCursorPos
GetClientRect
GetClassInfoW
GetCapture
GetAsyncKeyState
FillRect
EnumThreadWindows
EndPaint
EnableWindow
EnableMenuItem
DrawIconEx
DestroyWindow
DestroyIcon
DeleteMenu
CopyImage
ClientToScreen
CharUpperBuffW
CharLowerBuffW
BeginPaint
wvsprintfW
SetWindowTextW
SetWindowLongW
SetPropW
SendMessageW
PostMessageW
PeekMessageW
MessageBoxW
LoadStringW
LoadImageW
LoadIconW
LoadCursorW
LoadBitmapW
GetWindowTextLengthW
GetWindowLongW
GetPropW
GetClassNameW
GetClassLongW
GetClassInfoW
DrawTextW
DispatchMessageW
DefWindowProcW
CallWindowProcW
lstrcmpiA
LoadLibraryA
LocalFree
LocalAlloc
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
IsValidLocale
GetSystemDefaultUILanguage
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetUserDefaultUILanguage
GetLocaleInfoW
GetLastError
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
CompareStringW
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleW
lstrcpyW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
TerminateThread
TerminateProcess
SystemTimeToFileTime
Sleep
SizeofResource
SignalObjectAndWait
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
SetCurrentDirectoryW
ResumeThread
ResetEvent
ReadFile
OpenProcess
MultiByteToWideChar
LocalFree
LoadResource
LoadLibraryA
LoadLibraryW
LeaveCriticalSection
IsValidLocale
InitializeCriticalSection
GlobalUnlock
GlobalLock
GetVersionExW
GetVersion
GetTickCount
GetThreadLocale
GetStdHandle
GetLongPathNameA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileSize
GetFileAttributesW
GetExitCodeThread
GetExitCodeProcess
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCPInfo
InterlockedExchange
InterlockedCompareExchange
FreeLibrary
FormatMessageW
FindFirstFileExW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
EnumCalendarInfoW
EnterCriticalSection
DeleteFileW
DeleteCriticalSection
CreateThread
CreateFileW
CreateEventW
CreateDirectoryW
CopyFileW
CompareStringW
CloseHandle
WritePrivateProfileStringW
QueryDosDeviceW
LoadLibraryW
GetVolumeInformationW
GetVersionExW
GetTempPathW
GetTempFileNameW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
GetPrivateProfileIntW
GetModuleHandleW
GetModuleFileNameW
GetFileAttributesW
GetDateFormatW
GetCommandLineW
FormatMessageW
FindResourceW
FindNextFileW
DeleteFileW
CreateProcessW
CreateFileW
CreateDirectoryW
Sleep
GetSystemDefaultUILanguage
SetWindowOrgEx
SetTextColor
SetRectRgn
SetROP2
SetBrushOrgEx
SetBkMode
SetBkColor
SelectObject
SaveDC
RestoreDC
OffsetRgn
MoveToEx
IntersectClipRect
GetStockObject
ExtSelectClipRgn
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgn
CreateCompatibleDC
CreateCompatibleBitmap
CombineRgn
BitBlt
GetTextExtentPoint32W
GetObjectW
CreateFontIndirectW
InitCommonControls
ShellExecuteW
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteW
CLSIDFromProgID
CoCreateInstance
CoUninitialize
CoInitialize
IsEqualGUID
CoTaskMemFree
GdipCreateBitmapFromScan0
GdipDrawImageRectRectI
GdipDrawImageI
GdipGetImageGraphicsContext
InternetSetStatusCallback
InternetSetOptionW
InternetReadFile
InternetOpenW
InternetConnectW
InternetCloseHandle
HttpSendRequestW
HttpQueryInfoW
HttpOpenRequestW
HttpAddRequestHeadersW
FindMimeFromData
CryptBinaryToStringA
PathGetCharTypeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ