Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
147ccc4ce13dfb78e06d41000c134445_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
147ccc4ce13dfb78e06d41000c134445_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
147ccc4ce13dfb78e06d41000c134445_JaffaCakes118
Size
148KB
MD5
147ccc4ce13dfb78e06d41000c134445
SHA1
288a34a2772320089bffc421347a272408a85a39
SHA256
2816173a9c7a019b1e173c796eeffd6fb3c881c2fb4eb4635ad2720d3858a008
SHA512
3c9765a40f03478a4943c489ea631f9a1658cce106df8736472ecf041b38463e235861e5d43da3c9bef92ba29a3e4965344ff36226b8926757d63106c6013900
SSDEEP
3072:ytk3bG2NHilNOYMIaXBRBfxKJQ6KZZvsiHJFXnyPtRS9WJy:+KbG2AlN9iRBfxKJQ/ZlzXny3k
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PathFindExtensionA
PathFileExistsA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
GetProcessImageFileNameA
RegCreateKeyA
LookupAccountNameA
GetFileSecurityA
GetSecurityDescriptorDacl
GetAclInformation
AddAce
GetAce
RegCloseKey
RegQueryValueExA
RegOpenKeyA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
DuplicateTokenEx
CreateProcessAsUserA
RegSetValueExA
RegSetValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
DeleteService
QueryServiceStatus
ControlService
OpenServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
StartServiceA
SetFileSecurityA
EqualSid
LocalFree
WriteFile
GetStdHandle
HeapFree
HeapAlloc
GetProcessHeap
LocalAlloc
lstrlenA
CreateEventA
SetEvent
GetFileAttributesA
DeleteFileA
GetCurrentDirectoryA
GetVersion
GetLogicalDrives
DeleteCriticalSection
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrcpynA
lstrcmpA
TlsAlloc
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetCurrentThreadId
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
FlushFileBuffers
SetEndOfFile
RtlUnwind
HeapReAlloc
GetCommandLineA
ExitProcess
GetTimeZoneInformation
GetACP
RaiseException
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
GetStartupInfoA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLocalTime
WinExec
GetVersionExA
CopyFileA
MultiByteToWideChar
CreateIoCompletionPort
CreateThread
WaitForMultipleObjects
CreateProcessA
GetQueuedCompletionStatus
EnterCriticalSection
CreateMutexA
WaitForSingleObject
ReleaseMutex
LeaveCriticalSection
QueryDosDeviceA
GetSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
WritePrivateProfileStringA
Sleep
GetShortPathNameA
CreateFileMappingA
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
IsBadReadPtr
SetFilePointer
GetLastError
Process32First
Process32Next
TerminateProcess
OpenThread
CreateToolhelp32Snapshot
OpenProcess
Thread32First
TerminateThread
SuspendThread
Thread32Next
GetModuleHandleA
GetCurrentProcess
SetLastError
GetWindowsDirectoryA
GetSystemDirectoryA
GetPrivateProfileStringA
CreateDirectoryA
CreateFileA
GetFileSize
CloseHandle
ReadFile
GetModuleFileNameA
GetProcAddress
LoadLibraryA
FreeLibrary
GlobalFree
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
LoadStringA
wsprintfA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
RectVisible
Escape
PtVisible
ExtTextOutA
TextOutA
GetClipBox
SetTextColor
SetBkColor
GetObjectA
GetDeviceCaps
DeleteObject
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreateBitmap
OpenPrinterA
DocumentPropertiesA
ClosePrinter
SHGetSpecialFolderPathA
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ