Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
09a3fb773a9ec87ed3afffcaae18829f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09a3fb773a9ec87ed3afffcaae18829f_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
09a3fb773a9ec87ed3afffcaae18829f_JaffaCakes118
Size
1.1MB
MD5
09a3fb773a9ec87ed3afffcaae18829f
SHA1
fe917fb1151159d26603eaa8bc2a03f4ad57d707
SHA256
12632261845ee6a54f9ac603869819d10854449a7afb4b47b75ad6fe5f89d98e
SHA512
af5349d4b0ae21429e474ffbc81b3ec75acb511980eb0b5d3d086a9611f38992bd3a0cf47ed248622331157976053ca23ae40eb48407bcfcc8ed12f688a2fda0
SSDEEP
24576:Dzhf7HUexbctvDygPwXyseJkQOgmfhaXy/d3ic:vhjHFg4SOvhai/d3ic
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\evil\SVN\Exe\projects\arcadeyum\bin\module.runner.pdb
ResetEvent
WaitForSingleObject
Sleep
LoadResource
SizeofResource
CloseHandle
GetTickCount
CreateMutexA
OpenMutexA
CreateEventA
FindResourceA
CreateDirectoryA
RemoveDirectoryA
DeleteFileA
FindFirstFileA
SetEvent
MoveFileExA
GetVersionExA
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
InitializeCriticalSectionAndSpinCount
lstrlenA
CreateFileW
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetStringTypeW
HeapReAlloc
SetLastError
GetLastError
GetCurrentProcess
OpenProcess
LockResource
FreeResource
GetComputerNameA
FindNextFileA
GetVolumeInformationA
LCMapStringW
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetProcessHeap
GetConsoleCP
WideCharToMultiByte
DeleteCriticalSection
SetEndOfFile
GetFileType
EncodePointer
DecodePointer
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
ReadFile
GetCommandLineA
GetStdHandle
WriteFile
GetModuleFileNameW
HeapAlloc
HeapFree
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
HeapSize
InterlockedIncrement
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetConsoleMode
ReadConsoleW
SetFilePointer
SetFilePointerEx
MessageBoxA
CreateWindowExA
RegisterClassExA
GetMessageA
PostQuitMessage
TranslateMessage
DispatchMessageA
DefWindowProcA
AllocateAndInitializeSid
EqualSid
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyA
RegCloseKey
FreeSid
ord680
ShellExecuteExA
SHGetFolderPathA
CoUninitialize
CoCreateInstance
CoInitialize
VariantInit
VariantClear
SysAllocString
ord176
wnsprintfA
WinHttpReceiveResponse
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpOpenRequest
WinHttpSendRequest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ