Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
1313c7bb40781e133539b1e9531c212b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1313c7bb40781e133539b1e9531c212b_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
1313c7bb40781e133539b1e9531c212b_JaffaCakes118
Size
1.1MB
MD5
1313c7bb40781e133539b1e9531c212b
SHA1
868cfc14ec3a846daeb18b4de854c61761795340
SHA256
1640ec655587d3a6fb45a2ec53f4d91a906dd4e49dea1719887e933d7e286712
SHA512
aedc6cc51593f85fbd0f236bc627f852081973393c22352d97b05a57d00b22f5b34c910201e13b1f61c5cfb36eb41f9f6184105c3d0d5be88b808064a60bf228
SSDEEP
24576:9k2Y+dnaRkErGb1u7SYXj2OgOVwlMhlD9MPj0vnY:9k2ldnurGb1uxjFwkDoAfY
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitCommonControlsEx
EnterCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
FreeResource
GlobalAlloc
HeapAlloc
GetProcessHeap
GetTempPathW
InitializeCriticalSection
DeleteCriticalSection
CreateThread
GetTickCount
ExitProcess
CreateMutexW
lstrcmpA
GetTempFileNameW
MoveFileExW
TerminateThread
SetEvent
OutputDebugStringW
CreateEventW
RaiseException
InitializeCriticalSectionAndSpinCount
lstrcmpiW
FlushInstructionCache
lstrcmpW
MulDiv
GetModuleFileNameW
GetCurrentThreadId
SetLastError
LoadLibraryExW
InterlockedPopEntrySList
VirtualFree
InterlockedPushEntrySList
InterlockedCompareExchange
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
LeaveCriticalSection
SetEnvironmentVariableW
CompareStringW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetHandleCount
GetModuleFileNameA
HeapSize
HeapReAlloc
GetStringTypeW
GetStdHandle
HeapCreate
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStartupInfoW
HeapSetInformation
GetCommandLineA
ExitThread
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapFree
RtlUnwind
InterlockedExchange
GetComputerNameW
GetVolumeInformationW
GetVersionExW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
LoadLibraryA
lstrlenW
lstrlenA
GetModuleHandleW
FindResourceW
LoadResource
LockResource
SizeofResource
SetFileTime
CreateDirectoryW
DosDateTimeToFileTime
SystemTimeToFileTime
GetCurrentProcess
DuplicateHandle
LocalAlloc
GetFileType
SetFilePointer
GetFileAttributesW
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
ReadFile
GetCurrentDirectoryW
CreateFileW
WriteFile
DeleteFileW
Sleep
ExpandEnvironmentStringsW
LoadLibraryW
GetProcAddress
LocalFree
FreeLibrary
GetLastError
OpenProcess
CloseHandle
IsWindowVisible
GetUpdateRect
GetClassInfoExW
PostThreadMessageW
RegisterClassW
CharNextW
MoveWindow
ClientToScreen
UnregisterClassA
GetWindowThreadProcessId
FindWindowW
wsprintfW
ValidateRect
GetClassNameW
SetActiveWindow
SetForegroundWindow
CreateWindowExW
RegisterClassExW
ScreenToClient
GetDC
InvalidateRgn
SetCapture
IsChild
CallWindowProcW
GetDesktopWindow
DestroyAcceleratorTable
GetWindow
GetFocus
CreateAcceleratorTableW
SetTimer
KillTimer
PeekMessageW
GetMonitorInfoW
MonitorFromPoint
GetWindowTextW
RegisterWindowMessageW
CreateWindowExA
GetCursorPos
MapWindowPoints
RedrawWindow
FillRect
GetWindowTextLengthW
GetClientRect
GetSysColor
SetWindowPos
IsWindow
InvalidateRect
SendDlgItemMessageW
SetWindowTextW
GetMessageW
TranslateMessage
DispatchMessageW
MessageBoxExW
IsDialogMessageW
GetWindowDC
SetCursor
PostQuitMessage
SetDlgItemTextW
CloseWindow
GetDlgCtrlID
IsWindowEnabled
CopyRect
PostMessageW
SystemParametersInfoW
MessageBoxW
GetParent
IsDlgButtonChecked
BeginPaint
ReleaseDC
EndPaint
CheckDlgButton
EnableWindow
LoadCursorW
SendMessageW
SetWindowLongW
GetWindowLongW
DefWindowProcW
GetDlgItem
SetFocus
GetWindowRect
BringWindowToTop
ShowWindow
DestroyWindow
LoadIconW
ReleaseCapture
CreateCompatibleBitmap
SetTextAlign
SetTextColor
TextOutW
GetTextExtentPoint32W
CreateCompatibleDC
DeleteDC
SelectObject
SetDIBColorTable
GetDeviceCaps
GetDIBColorTable
CreateFontIndirectW
GetStockObject
DeleteObject
StretchBlt
CreateDIBSection
CreateSolidBrush
SetBkColor
BitBlt
GetObjectW
SetBkMode
GetUserNameW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyW
CheckTokenMembership
RegLoadKeyW
RegQueryValueExW
LookupAccountSidW
RegUnLoadKeyW
RegOpenKeyExW
GetLengthSid
CopySid
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
OpenProcessToken
RegCloseKey
ShellExecuteW
SHGetFolderPathW
ShellExecuteExW
OleUninitialize
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CreateStreamOnHGlobal
CoInitialize
CoCreateInstance
CoUninitialize
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VarUI4FromStr
SysAllocStringLen
SysStringLen
VariantClear
VariantInit
SysAllocString
SysFreeString
StrStrIW
PathFileExistsW
SHDeleteKeyW
StrStrA
StrStrW
wnsprintfW
AlphaBlend
TransparentBlt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ