Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
237ded549ce4debd75475d2a5c7f26c4_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
237ded549ce4debd75475d2a5c7f26c4_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
237ded549ce4debd75475d2a5c7f26c4_JaffaCakes118
Size
2.6MB
MD5
237ded549ce4debd75475d2a5c7f26c4
SHA1
e86c3e335e81691ed76eb410e91a02569842b9db
SHA256
c41957d2eb39cb9cd07adaedb44a396075d7dc17839051e8704630154d7ac6ff
SHA512
c174de172ce1b3f7ec83ae76411c2db2ed3c3d195cfdf7847408629cbd747119f1874b2ecfe6b60a05e70b7726a5dd87fbb4c195113d411ce896d9765b5c8783
SSDEEP
49152:t9lG44n+AjHI9elfKh4Z0LFp5CqeVl/CBS/z:t9lG4M+WG8/CBS/z
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReleaseMutex
MoveFileA
WideCharToMultiByte
GetCurrentProcess
GetModuleHandleA
SetFilePointer
GetFileType
DuplicateHandle
CreateFileA
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
DosDateTimeToFileTime
SetFileTime
WriteFile
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
CreateMutexA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetOEMCP
GetACP
GetCPInfo
SetHandleCount
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
HeapReAlloc
UnhandledExceptionFilter
FindResourceA
LoadResource
LockResource
SizeofResource
GetComputerNameA
GetLocalTime
LocalAlloc
GetProcessHeap
HeapAlloc
HeapFree
SetCurrentDirectoryA
MultiByteToWideChar
GetLongPathNameA
GetDiskFreeSpaceExA
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
OpenMutexA
GetLastError
Sleep
CreateProcessA
WaitForSingleObject
CloseHandle
GetTempPathA
DeleteFileA
SetFileAttributesA
CopyFileA
MoveFileExA
GetDiskFreeSpaceA
GetShortPathNameA
WinExec
WritePrivateProfileStringA
LoadLibraryA
GetPrivateProfileStringA
GetProcAddress
FreeLibrary
GetVersionExA
CreateDirectoryA
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
TlsGetValue
SetLastError
TlsAlloc
GetCurrentThreadId
InterlockedIncrement
OutputDebugStringA
InterlockedDecrement
lstrlenA
GetStringTypeA
GetStdHandle
DebugBreak
LeaveCriticalSection
ExitProcess
TerminateProcess
RtlUnwind
ResumeThread
CreateThread
TlsSetValue
ExitThread
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetStartupInfoA
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
EndDialog
CallWindowProcA
GetWindowTextA
KillTimer
EndPaint
InvalidateRect
SetTimer
ShowWindow
BeginPaint
GetClientRect
FillRect
GetDlgCtrlID
LoadBitmapA
SetWindowTextA
SetDlgItemTextA
EnableWindow
GetDlgItemTextA
LoadIconA
MessageBoxA
DialogBoxParamA
InvalidateRgn
GetFocus
DrawFocusRect
GetDlgItem
GetDC
SendMessageA
GetSystemMetrics
SetWindowPos
SetWindowLongA
ReleaseDC
LoadCursorA
SetCursor
SetStretchBltMode
CreateSolidBrush
CreateCompatibleDC
StretchBlt
CreateFontA
TextOutA
DeleteDC
SetTextColor
SetBkColor
ExtTextOutA
GetObjectA
CreateFontIndirectA
SelectObject
GetTextExtentPoint32A
SetBkMode
InitializeAcl
RegQueryValueExA
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ControlService
GetUserNameA
GetSidLengthRequired
InitializeSid
RegOpenKeyExA
GetLengthSid
RegCloseKey
AddAccessAllowedAceEx
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
RegCreateKeyExA
RegFlushKey
AllocateAndInitializeSid
FreeSid
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderPathA
ShellExecuteA
SHGetMalloc
CoInitialize
CoCreateInstance
ord17
PathFileExistsA
StrFormatByteSizeW
SHDeleteKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ