Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2e1b425259e1612bb2f1d64120f8b62e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2e1b425259e1612bb2f1d64120f8b62e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
2e1b425259e1612bb2f1d64120f8b62e_JaffaCakes118
Size
254KB
MD5
2e1b425259e1612bb2f1d64120f8b62e
SHA1
f57d54a127b7162920b155c91d45e67286fef474
SHA256
04c771b69114887a214d13849c7fe5d0a48a4a221270beeb8c836566d0876d9f
SHA512
db06113957c4d645fe76924ae223ca5e7a97ae3c6fdbe884c121abf6b2109cee132ec8e46a2b72d4877f394d2fa817eae2b27770543ad1dfae57e813cb5d574f
SSDEEP
3072:mbhSUKM9Md/TAABBT+zs7nwKjDbLvEILw9i41Ds5HhPQIa/OpO1eQnVlp:moUL9Md/EABBIsMKjL8ILA9ohW2eeQr
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\work\test\hdtool\Release\hdtool.pdb
GetStartupInfoW
ExitProcess
HeapAlloc
HeapFree
RtlUnwind
RaiseException
HeapReAlloc
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetErrorMode
FlushFileBuffers
lstrlenA
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
GetModuleHandleA
GlobalFindAtomW
LoadLibraryA
GetVersionExA
InterlockedDecrement
GlobalAddAtomW
WritePrivateProfileStringW
SetLastError
FormatMessageW
lstrlenW
GlobalDeleteAtom
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
InterlockedExchange
lstrcmpW
LocalAlloc
lstrcpynW
VirtualAlloc
GetTickCount
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetVersionExW
FreeLibrary
LoadLibraryW
GetProcAddress
TerminateProcess
Process32NextW
GetCurrentProcessId
Process32FirstW
CreateToolhelp32Snapshot
GetModuleFileNameW
GetModuleHandleW
FormatMessageA
GetLastError
WriteFile
GetLocalTime
GetFileSize
DeleteFileA
GetModuleFileNameA
SetFilePointer
CreateFileA
WideCharToMultiByte
CloseHandle
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetCurrentThread
LocalFree
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
Sleep
GetCurrentProcess
IsWow64Process
GetACP
VirtualFree
UnregisterClassW
GetSysColorBrush
LoadCursorW
ShowWindow
SetWindowTextW
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetWindowTextW
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
PtInRect
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetSysColor
DestroyMenu
CopyRect
UnhookWindowsHookEx
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
GetForegroundWindow
DispatchMessageW
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetActiveWindow
DestroyWindow
IsWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetParent
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostQuitMessage
PostMessageW
EnableWindow
GetClientRect
GetSystemMetrics
IsIconic
SendMessageW
LoadIconW
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
PtVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
ExtTextOutW
GetDeviceCaps
CreateBitmap
ClosePrinter
DocumentPropertiesW
OpenPrinterW
CreateServiceW
OpenSCManagerW
RegOpenKeyExW
RegQueryValueExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
ControlService
GetTokenInformation
OpenProcessToken
OpenThreadToken
ConvertSidToStringSidW
LookupAccountSidW
StartServiceW
RegCloseKey
CloseServiceHandle
DeleteService
QueryServiceStatus
OpenServiceW
InitCommonControlsEx
PathFindFileNameW
PathFileExistsW
PathFindExtensionW
PathRemoveFileSpecA
PathRemoveFileSpecW
VariantClear
VariantChangeType
VariantInit
CryptMsgGetParam
CertCloseStore
CryptMsgClose
CertFreeCertificateContext
CertFindCertificateInStore
CryptQueryObject
CertGetNameStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE