Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2de5e3bd77f2dfe97a648a7035892fdb_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2de5e3bd77f2dfe97a648a7035892fdb_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
2de5e3bd77f2dfe97a648a7035892fdb_JaffaCakes118
Size
13.4MB
MD5
2de5e3bd77f2dfe97a648a7035892fdb
SHA1
80b7d52e3f6171f316ef79d9b42f4113a92fe097
SHA256
8f71be9cd2056da8afe9eb6e26e1cac56d86270c33051b50f18c13f30a76b88b
SHA512
b532b76bf04390fbdde7a97ce7b8f9d840bf49b5a6ca97424377ef2957c3b5899e8d508ab9dd7217e173f36dc551eefbe38a3f047f7240df8ab1c9c15b4d3503
SSDEEP
393216:/Bh4y8dzjEQleJtwbeNGU8rqHwKsP7jvaLsc+s:/BhIZeJuCQU8rqHwTXva
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\build\360DeskTop_NetProtect_beta\src\360Setup\Release\Setup.pdb
FindClose
GetPrivateProfileIntW
GetFullPathNameW
FindFirstFileW
FormatMessageW
CopyFileW
GetVolumeInformationW
OpenProcess
CompareFileTime
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableW
GetSystemInfo
GetLongPathNameW
InitializeCriticalSection
DeleteCriticalSection
CreateMutexW
lstrcmpiW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetCommandLineW
QueryDosDeviceW
GetLogicalDriveStringsW
GetSystemDirectoryW
CreateProcessW
FindAtomW
GlobalAddAtomW
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
CreateFileA
GetTempPathA
CreateThread
DeviceIoControl
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetStdHandle
SetEndOfFile
SetFileTime
MultiByteToWideChar
GetModuleHandleW
GetLastError
LocalAlloc
LocalFree
GetTempFileNameW
GetFileAttributesW
GlobalFindAtomW
GetVersionExW
CreateDirectoryW
WritePrivateProfileStringW
lstrcmpiA
lstrcatW
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetDriveTypeA
GetCurrentDirectoryA
FlushFileBuffers
FindNextFileW
IsValidLocale
GetCurrentThreadId
GetUserDefaultLCID
GetStringTypeA
GetLocaleInfoA
GetDateFormatA
GetTimeFormatA
GetTimeZoneInformation
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
GetModuleHandleA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetModuleFileNameA
HeapCreate
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
GetStartupInfoW
ExitProcess
ExitThread
RtlUnwind
lstrcpyW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
CreateFileW
WriteFile
GetDriveTypeW
Sleep
GetLocalTime
GetModuleFileNameW
GetShortPathNameW
MoveFileW
MoveFileExW
DeleteFileW
GetProcAddress
FreeLibrary
SetFileAttributesW
RemoveDirectoryW
GetTempPathW
lstrlenA
OutputDebugStringW
DebugBreak
InterlockedIncrement
LoadLibraryW
lstrlenW
InterlockedDecrement
WaitForSingleObject
CloseHandle
GetFileAttributesExW
UnmapViewOfFile
SetFilePointer
MapViewOfFile
CreateFileMappingW
UnlockFile
ReadFile
GetFileSize
LockFile
ResetEvent
SetEvent
CreateEventW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetFileSizeEx
TlsFree
DeleteAtom
TlsAlloc
ReleaseMutex
ReadProcessMemory
ExpandEnvironmentStringsW
GetFileTime
GetExitCodeProcess
TerminateProcess
FindResourceExW
GetDiskFreeSpaceExW
LockResource
HeapReAlloc
HeapSize
SetStdHandle
SetLastError
InterlockedExchange
SystemTimeToFileTime
GetSystemTimeAsFileTime
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
MulDiv
RaiseException
GetPrivateProfileStringW
GetThreadLocale
EnumSystemLocalesA
SetThreadLocale
LocalFileTimeToFileTime
SetFilePointerEx
GetSystemTime
lstrcmpA
WideCharToMultiByte
TlsGetValue
TlsSetValue
AddAtomW
OpenThread
GetAtomNameW
HeapDestroy
CallWindowProcW
EndDialog
wvsprintfW
SendMessageTimeoutW
FindWindowW
PostMessageW
LoadStringW
CharUpperW
CharNextW
GetWindowLongW
SetWindowTextW
MoveWindow
GetClientRect
SendMessageW
IsWindow
EnableWindow
GetDlgItem
IsWindowEnabled
ShowWindow
SetDlgItemTextW
EnumWindows
GetClassNameW
GetWindowThreadProcessId
SetCursor
PtInRect
wsprintfW
WaitForInputIdle
DialogBoxParamW
MessageBoxW
OffsetRect
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
BringWindowToTop
RegisterClassExW
LoadCursorW
GetClassInfoExW
GetSystemMetrics
LoadImageW
IsIconic
PostQuitMessage
InflateRect
IsDialogMessageW
GetSystemMenu
EnableMenuItem
GetActiveWindow
CharLowerW
EndPaint
BeginPaint
ScreenToClient
DefWindowProcW
CopyRect
KillTimer
SetTimer
CreateDialogParamW
GetWindowTextLengthW
MessageBeep
SetFocus
RedrawWindow
InvalidateRect
DestroyWindow
CreateWindowExW
FindWindowExW
GetWindowTextW
ReleaseDC
GetDC
SetWindowLongW
GetParent
ExitWindowsEx
UnregisterClassA
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
SetWindowPos
IsWindowVisible
CreateCompatibleBitmap
BitBlt
DeleteObject
DeleteDC
SetViewportOrgEx
SelectObject
CreateCompatibleDC
LookupAccountSidW
RegQueryInfoKeyW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
GetUserNameW
GetNamedSecurityInfoW
BuildExplicitAccessWithNameW
SetEntriesInAclW
SetNamedSecurityInfoW
GetExplicitEntriesFromAclW
EqualSid
GetTrusteeNameW
DeleteAce
RegOpenKeyExA
LookupAccountNameW
RegOpenKeyW
RegEnumKeyExW
RegCloseKey
RegEnumKeyExA
RegQueryValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryValueExA
SHChangeNotify
SHGetMalloc
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetFolderPathW
SHFileOperationW
ShellExecuteW
SHBrowseForFolderW
ord165
ShellExecuteExW
ord680
SHCreateDirectoryExW
CoCreateGuid
CoTaskMemFree
CoTaskMemAlloc
OleRun
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemRealloc
SysFreeString
SystemTimeToVariantTime
VarUdateFromDate
VariantTimeToSystemTime
VariantInit
SysStringLen
SysStringByteLen
SysAllocStringByteLen
VariantClear
SysAllocString
VarUI4FromStr
PathFileExistsA
PathRemoveFileSpecW
PathAddBackslashW
PathAppendW
PathFileExistsW
SHGetValueW
SHDeleteKeyW
PathCombineW
PathFindFileNameW
SHDeleteValueW
PathIsRelativeW
SHGetValueA
PathRemoveExtensionW
PathMatchSpecW
StrRetToStrW
PathIsNetworkPathW
PathIsURLW
PathIsDirectoryW
StrCmpIW
PathFindExtensionW
SHSetValueA
PathAppendA
PathRemoveBackslashW
wnsprintfW
PathIsPrefixW
SHSetValueW
InitCommonControlsEx
AlphaBlend
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
EnumProcesses
GetProcessImageFileNameW
GetModuleFileNameExW
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
CertGetNameStringW
CertCloseStore
CryptMsgUpdate
CryptMsgOpenToDecode
CertOpenStore
CertGetCertificateContextProperty
CryptMsgClose
URLDownloadToFileW
URLDownloadToCacheFileW
GetAdaptersInfo
InternetGetConnectedState
Netbios
SetupIterateCabinetW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ