Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
164d6a636417f34658a3cff67ad526f3_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
164d6a636417f34658a3cff67ad526f3_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
164d6a636417f34658a3cff67ad526f3_JaffaCakes118
Size
1.1MB
MD5
164d6a636417f34658a3cff67ad526f3
SHA1
60f906ca657cac46b34d903ffd0127c42130c42c
SHA256
1c760857e861e7a69e3a01cdc1bd3cd5fe8d4de8b5027025a59888ae713b71bf
SHA512
d3298fd9ce701214ff450590ad9a131dcb699025394c2e0769958151e9be77395bf0d68b2451a32041e75b83eedc54d8aa84dfab123577fa9c6d82bf011946eb
SSDEEP
24576:Dr2fMLQ6gSy8Q7BiNL+VElHA1dHdQ0aKMrzws1Ztf3vw:v2EUOQdiNiElHAbdoKUwsVf3vw
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\evil\SVN\Exe\projects\arcadeyum\bin\module.runner.pdb
ResetEvent
WaitForSingleObject
Sleep
LoadResource
SizeofResource
CloseHandle
GetTickCount
CreateMutexA
OpenMutexA
CreateEventA
FindResourceA
CreateDirectoryA
RemoveDirectoryA
DeleteFileA
FindFirstFileA
SetEvent
MoveFileExA
GetVersionExA
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
InitializeCriticalSectionAndSpinCount
lstrlenA
CreateFileW
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetStringTypeW
HeapReAlloc
SetLastError
GetLastError
GetCurrentProcess
OpenProcess
LockResource
FreeResource
GetComputerNameA
FindNextFileA
GetVolumeInformationA
LCMapStringW
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetProcessHeap
GetConsoleCP
WideCharToMultiByte
DeleteCriticalSection
SetEndOfFile
GetFileType
EncodePointer
DecodePointer
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
ReadFile
GetCommandLineA
GetStdHandle
WriteFile
GetModuleFileNameW
HeapAlloc
HeapFree
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
HeapSize
InterlockedIncrement
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetConsoleMode
ReadConsoleW
SetFilePointer
SetFilePointerEx
MessageBoxA
CreateWindowExA
RegisterClassExA
GetMessageA
PostQuitMessage
TranslateMessage
DispatchMessageA
DefWindowProcA
AllocateAndInitializeSid
EqualSid
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyA
RegCloseKey
FreeSid
ord680
ShellExecuteExA
SHGetFolderPathA
CoUninitialize
CoCreateInstance
CoInitialize
VariantInit
VariantClear
SysAllocString
ord176
wnsprintfA
WinHttpReceiveResponse
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpOpenRequest
WinHttpSendRequest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ