Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
096630b8ebb09163242aba68c81a15ab_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
096630b8ebb09163242aba68c81a15ab_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
096630b8ebb09163242aba68c81a15ab_JaffaCakes118
Size
1.8MB
MD5
096630b8ebb09163242aba68c81a15ab
SHA1
7aff93be84d367524e44ba98523ded2d17a85f7f
SHA256
6128e8e8f240c2e82b9e51050ca0d4f864710614fd170ea1666d6d7fe45df0b0
SHA512
255aa2c4f81ed57d24999382bebf07a8288683474d751a82e1a92f16a3285db32f3308493a42e9bf22060da50265f7ad9eb3f612440d190cf3fa0c5b15a998db
SSDEEP
49152:zHY3RcrlpI06JeUrVTQCWnU/Kr2qI/kycvP:zHY3RkI06JxVT8U/dN/9c
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadResource
WideCharToMultiByte
SizeofResource
GetFileAttributesA
MultiByteToWideChar
LockResource
Process32First
OpenProcess
Process32Next
CreateToolhelp32Snapshot
LocalFree
SignalObjectAndWait
UnregisterWait
GetThreadPriority
GetTimeZoneInformation
RegisterWaitForSingleObject
FindResourceA
TerminateProcess
InterlockedDecrement
Sleep
ExitProcess
GetTempPathA
GetCurrentProcessId
GetVersionExA
CreateMutexA
GetTempFileNameA
GetVolumeInformationA
GetComputerNameA
DeleteFileA
CloseHandle
GetLocalTime
GetLastError
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
SetThreadPriority
CreateEventW
SetEvent
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
SwitchToThread
SetThreadAffinityMask
GetProcessAffinityMask
DeleteTimerQueueTimer
CreateDirectoryA
GetExitCodeProcess
GetTickCount
WaitForSingleObject
HeapFree
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapAlloc
GetCPInfo
ReadFile
GetConsoleMode
ReadConsoleW
SetFilePointer
WriteFile
GetConsoleCP
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetProcessHeap
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
SetFilePointerEx
FlushFileBuffers
HeapSize
SetLastError
InterlockedIncrement
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameW
RaiseException
IsValidCodePage
GetACP
GetOEMCP
GetStringTypeW
CreateFileW
GetModuleHandleW
SetStdHandle
WriteConsoleW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreW
RtlUnwind
HeapReAlloc
InterlockedExchange
FreeLibrary
LoadLibraryExW
OutputDebugStringW
LoadLibraryW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetEndOfFile
DuplicateHandle
GetExitCodeThread
lstrlenA
CreateTimerQueue
CreateTimerQueueTimer
ExitThread
CreateThread
SetEnvironmentVariableA
EnumWindows
IsWindow
GetWindowThreadProcessId
IsWindowVisible
GetClassNameA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
FreeSid
AllocateAndInitializeSid
RegQueryValueA
LookupAccountSidA
EqualSid
GetTokenInformation
ConvertSidToStringSidA
OpenProcessToken
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
ShellExecuteW
SHFileOperationA
SHGetFolderPathA
ShellExecuteExA
CoSetProxyBlanket
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
CoUninitialize
SysAllocString
VariantClear
VariantInit
SysFreeString
StrStrIA
PathFileExistsA
wnsprintfA
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetOpenUrlA
ord22
ord20
ord23
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ