Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2816e5e1efa636ba099a3c08273e17de_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2816e5e1efa636ba099a3c08273e17de_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
2816e5e1efa636ba099a3c08273e17de_JaffaCakes118
Size
29.7MB
MD5
2816e5e1efa636ba099a3c08273e17de
SHA1
92aec82a13ffc4a823de3fccfa7447aabba2b676
SHA256
2dde4ce08c509b9dd41dd19f413ff53fc6b9c56ce807e446a52ac9207c171ecc
SHA512
e8b52a74da4c3032fd4415ce0f4e003f97870fbdfe1ce6019d51cf7f99ac89579e97e12fd32a0666229f5129b7a41a7be5af4c79c08e74a72f8acd9fef4c2c24
SSDEEP
786432:RRFHT/4TQ37gL9VmDgFlYN3bEQx1SereQ08:t6QrgfciWNrEQxUnQ08
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
FreeSid
RegEnumValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
AddAccessAllowedAce
RegSetKeySecurity
SetFileSecurityA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ImageList_LoadImageA
GdipDrawImageRectRectI
GdipGetPenFillType
GdipGetPenBrushFill
GdipCreatePen1
GdipFillRectangleI
GdipDeletePen
GdipBitmapGetPixel
GdipCreateFontFamilyFromName
GdipGetGenericFontFamilySansSerif
GdipDeleteFontFamily
GdipCreateFont
GdipCreateSolidFill
GdipCloneBrush
GdipCreateStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipDrawString
GdipDeleteBrush
GdipDeleteStringFormat
GdipDeleteFont
GdipCreateFromHDC
GdipCreateBitmapFromGraphics
GdipGetImageGraphicsContext
GdipDrawImagePointRectI
GdipDeleteGraphics
GdiplusStartup
GdipGetImageWidth
GdipGetImageHeight
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipFree
GdipAlloc
ReadFile
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
HeapSize
VirtualAlloc
VirtualFree
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetStdHandle
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCPInfo
LCMapStringW
LCMapStringA
HeapReAlloc
GetStartupInfoA
GetCommandLineA
CreateThread
ExitThread
GetSystemTimeAsFileTime
GetLastError
GetModuleFileNameA
Sleep
FreeResource
SetThreadLocale
SizeofResource
MulDiv
GetLocaleInfoA
GetThreadLocale
GetSystemDirectoryA
GetWindowsDirectoryA
GetCurrentDirectoryA
FindClose
FindFirstFileA
FindNextFileA
LocalFree
FreeLibrary
LoadLibraryExA
LockResource
LoadResource
FindResourceA
DeleteFileA
FreeEnvironmentStringsA
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetVersionExA
FlushInstructionCache
GetLocalTime
GetModuleHandleA
CloseHandle
SetFileTime
WriteFile
SetEndOfFile
SetFilePointer
GetFileAttributesA
GetTempFileNameA
CompareFileTime
GetFileInformationByHandle
CreateFileA
CopyFileA
MoveFileA
SetFileAttributesA
GetFullPathNameA
RemoveDirectoryA
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
GetShortPathNameA
WaitForSingleObject
lstrlenA
SetUnhandledExceptionFilter
GetCurrentProcessId
GetCurrentThreadId
CreateDirectoryA
GetUserDefaultLangID
OpenProcess
WideCharToMultiByte
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GlobalMemoryStatus
GetDiskFreeSpaceA
ResumeThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
ExitProcess
GetModuleHandleW
HeapFree
RaiseException
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
DeleteCriticalSection
InterlockedExchange
InterlockedDecrement
GetProcessHeap
InterlockedIncrement
FlushViewOfFile
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetTickCount
AdjustWindowRectEx
GetFocus
WaitForInputIdle
GetWindowThreadProcessId
FindWindowA
SendMessageW
SetCursor
TrackMouseEvent
SetWindowRgn
PostQuitMessage
MoveWindow
ReleaseCapture
LoadIconA
DrawFrameControl
GetWindowTextLengthA
GetWindowTextA
DrawTextA
DrawFocusRect
EndPaint
DefWindowProcA
GetParent
CreateWindowExA
SetWindowTextA
SetWindowPos
GetWindowLongA
SetWindowLongA
DestroyWindow
UnregisterClassA
LoadCursorA
RegisterClassExA
ExitWindowsEx
GetDlgItemTextA
GetWindowRect
MapWindowPoints
GetClassNameA
PostMessageA
IsDialogMessageA
GetWindow
CreateDialogParamA
DispatchMessageA
GetMessageA
PeekMessageA
GetSystemMetrics
ReleaseDC
SetFocus
InvalidateRect
BeginPaint
SetCapture
SetDlgItemTextA
SendMessageA
GetClientRect
GetDlgItem
ShowWindow
CheckDlgButton
SendDlgItemMessageA
IsWindow
GetDC
MessageBoxA
GetWindowDC
IsDlgButtonChecked
CreateCompatibleBitmap
DeleteObject
GetStockObject
SelectObject
ExtTextOutA
SetBkMode
SetBkColor
SetTextColor
TextOutA
SetTextAlign
DeleteDC
BitBlt
CreateCompatibleDC
CombineRgn
CreateRectRgn
GetDeviceCaps
SetDIBits
CreateFontA
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
ord680
ShellExecuteExA
CoUninitialize
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
VariantClear
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ