Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
050522542461760a14f494ebf773b379_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
050522542461760a14f494ebf773b379_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
050522542461760a14f494ebf773b379_JaffaCakes118
Size
1.5MB
MD5
050522542461760a14f494ebf773b379
SHA1
cb8fe1a86a10d92370437a79a0c7fab89c84ab9d
SHA256
404ae50b0e1bce4b8421cc654b54591fcc84edd600c76e1a2dda1e0653a6cfe9
SHA512
feda6015ea1625ecb1300a867210820c8ad477424e8cc9051f9e7890d4b823929d0fe2030e5e8c245b66d2d17ed8fa90ac85f0d6fbcc2c36714bc757e0a6f3b3
SSDEEP
24576:xYk/M+6NAAYYLvYQinzG34vLlNICwZPu0fFot:w2AYYLPp34DuJot
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InitializeCriticalSectionAndSpinCount
GetSystemDirectoryW
LoadLibraryExW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SystemTimeToFileTime
FileTimeToSystemTime
SetLastError
GetLastError
GetCurrentProcessId
CloseHandle
GetSystemTime
FreeLibrary
GetProcAddress
LoadLibraryW
GetModuleFileNameW
GetTimeFormatW
GetDateFormatW
FileTimeToLocalFileTime
GetModuleHandleA
GetModuleHandleW
GetFileAttributesW
GetVersion
lstrcmpiA
LoadLibraryA
OutputDebugStringA
MultiByteToWideChar
GetFileAttributesA
GetFileTime
CreateFileA
DeleteFileA
WriteFile
GetTempPathA
ReadFile
SetCurrentDirectoryA
lstrlenA
CompareFileTime
WaitForSingleObject
IsBadWritePtr
IsDBCSLeadByte
GetProfileStringA
GetSystemDefaultLCID
WideCharToMultiByte
GetACP
GetCurrentThreadId
lstrlenW
FreeResource
LockResource
LoadResource
GlobalAddAtomA
GetCurrentThread
TlsSetValue
SizeofResource
FindResourceW
TlsGetValue
LocalAlloc
FindResourceA
TlsAlloc
GetVersionExA
lstrcmpA
lstrcmpW
VirtualProtect
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetProcessHeap
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCurrentDirectoryA
VirtualAlloc
GetSubMenu
GetMenu
IsWindowEnabled
GetLastActivePopup
GetForegroundWindow
RegisterClassA
CreateWindowExW
GetClassInfoA
GetClassInfoW
GetDlgCtrlID
GetTopWindow
AdjustWindowRectEx
SystemParametersInfoA
GetMonitorInfoA
MonitorFromWindow
RemovePropA
GetPropA
SetPropA
SetWindowLongW
GetWindowLongW
SetWindowsHookExA
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
GetNextDlgTabItem
GetCursorPos
ValidateRect
GetKeyState
DispatchMessageA
TranslateMessage
GetMessageA
IsWindowVisible
MessageBoxA
TranslateAcceleratorA
GetDesktopWindow
BringWindowToTop
LoadAcceleratorsA
DestroyMenu
LoadMenuA
WinHelpA
SetMenu
EndDialog
CreateDialogIndirectParamA
CreateDialogIndirectParamW
DialogBoxIndirectParamA
DialogBoxIndirectParamW
TabbedTextOutA
DrawTextA
GrayStringA
DrawTextW
ModifyMenuW
TabbedTextOutW
GetMenuItemID
GetClassNameA
SetWindowTextA
UnregisterClassA
UnregisterClassW
CopyRect
IsDialogMessageW
IsDialogMessageA
GetWindow
IsWindowUnicode
DefWindowProcA
CallWindowProcA
GetMessageTime
GetMessagePos
GetWindowLongA
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
LoadStringA
GetWindowTextLengthA
GetWindowTextW
GetWindowTextA
BeginDeferWindowPos
EndDeferWindowPos
DeferWindowPos
GetAsyncKeyState
SendDlgItemMessageA
DrawFocusRect
DrawIcon
CharPrevA
DestroyWindow
IsCharAlphaNumericA
CharNextA
GetDC
ReleaseDC
MapDialogRect
MessageBoxW
ShowWindow
LoadMenuW
GetActiveWindow
GetOpenClipboardWindow
AnyPopup
GetCaretBlinkTime
CopyIcon
ShowCaret
GetThreadDesktop
VkKeyScanA
CloseWindow
GetQueueStatus
GetMenuContextHelpId
DestroyCursor
GetInputState
GetClipboardSequenceNumber
CreateMetaFileW
GetEnhMetaFileW
PathToRegion
GdiFlush
CloseEnhMetaFile
GetColorSpace
AddFontResourceA
BeginPath
CloseFigure
GetTextCharset
CreateMetaFileA
CancelDC
RegOpenKeyExA
RegQueryValueExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE