Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
163a9ec404af7d261700576a7a674074_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
163a9ec404af7d261700576a7a674074_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
163a9ec404af7d261700576a7a674074_JaffaCakes118
Size
733KB
MD5
163a9ec404af7d261700576a7a674074
SHA1
7318be9a05fce99cbd6b30fb32b8e3b240c266e6
SHA256
1c4fd9bc0d4fff115e2643a840b70740d74c73d71973be3b1b1dd29b5fdfc2e1
SHA512
719af0bdd8ad9d013e65bd23821861db0fd7ac5ac77cd8c3a7385753c90c1cdb804f80893486613207eedf0af0b2a30e99b4c4d4cbbe2aa530dae076b3e2d085
SSDEEP
12288:udFVd1s6rWFkBCgU0B4SrXq3vBJY8QQVVdxW/RuXggnaScY0AdTDXmFJOKeaBaZT:urVPvWFk/qyQVj2CBnUYjXVKea0R
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetLastError
InterlockedIncrement
InterlockedDecrement
GetProcAddress
GetModuleHandleA
lstrlenA
lstrcmpiA
IsDBCSLeadByte
FlushInstructionCache
lstrcmpA
MulDiv
GetModuleFileNameA
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentThreadId
SetLastError
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
MoveFileExA
DeleteFileA
LocalFree
Process32Next
OpenProcess
TerminateProcess
Process32First
CreateToolhelp32Snapshot
SleepEx
ExitProcess
InterlockedExchange
FreeResource
LockResource
HeapAlloc
CreateMutexA
LoadLibraryA
VerifyVersionInfoA
VerSetConditionMask
GetVersionExA
IsProcessorFeaturePresent
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
lstrlenW
GetConsoleCP
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStdHandle
HeapReAlloc
VirtualFree
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCPInfo
LCMapStringW
LCMapStringA
GetStartupInfoA
GetCommandLineA
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
InterlockedCompareExchange
WideCharToMultiByte
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetComputerNameA
MultiByteToWideChar
GetProcessHeap
HeapFree
CreateThread
GlobalFree
EnterCriticalSection
LeaveCriticalSection
lstrcatA
GetTempPathA
CreateProcessA
Sleep
GetExitCodeProcess
WriteFile
SetFileTime
GetCurrentDirectoryA
CreateDirectoryA
DosDateTimeToFileTime
SystemTimeToFileTime
ReadFile
CloseHandle
CreateFileA
GetCurrentProcess
DuplicateHandle
GetFileType
SetFilePointer
GetVolumeInformationA
GetConsoleMode
LocalAlloc
SetCursor
GetDlgCtrlID
ShowWindow
LoadCursorA
SendMessageA
RedrawWindow
UnregisterClassA
IsDlgButtonChecked
CheckRadioButton
CreateWindowExA
ReleaseDC
BeginPaint
EnableWindow
EndPaint
GetMessageA
SystemParametersInfoA
SetWindowTextA
SetWindowLongA
GetWindowLongA
CharNextA
DefWindowProcA
GetSysColor
DispatchMessageA
TranslateMessage
IsDialogMessageA
LoadIconA
IsWindowEnabled
MessageBoxA
BringWindowToTop
CopyRect
PostQuitMessage
UpdateWindow
GetWindowRect
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
CreateAcceleratorTableA
RegisterClassExA
GetClassInfoExA
IsWindow
GetDesktopWindow
SetFocus
GetFocus
GetWindow
DestroyAcceleratorTable
CallWindowProcA
DestroyWindow
FillRect
ReleaseCapture
GetClassNameA
GetDlgItem
GetParent
IsChild
SetCapture
InvalidateRgn
InvalidateRect
GetDC
ScreenToClient
ClientToScreen
GetClientRect
SetWindowPos
MoveWindow
GetDIBColorTable
StretchBlt
GetDeviceCaps
CreateCompatibleBitmap
SetTextColor
CreateCompatibleDC
SelectObject
GetObjectA
BitBlt
DeleteObject
DeleteDC
GetStockObject
SetBkColor
CreateSolidBrush
CreateDIBSection
SetDIBColorTable
SetBkMode
ConvertSidToStringSidA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
GetUserNameA
LookupAccountNameA
SHGetFolderPathA
ord680
ShellExecuteA
CoUninitialize
OleUninitialize
OleInitialize
CoInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CreateStreamOnHGlobal
SysFreeString
SysAllocStringLen
SysAllocString
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
VarUI4FromStr
SysStringLen
ord176
AssocQueryStringA
StrStrIA
PathFileExistsA
wnsprintfA
TransparentBlt
AlphaBlend
WTSFreeMemory
WTSQuerySessionInformationA
WinVerifyTrust
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ