Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
3066d1b2e84e8444082d70a1ad90c017_JaffaCakes118.exe
Resource
win7-20240221-en
Target
3066d1b2e84e8444082d70a1ad90c017_JaffaCakes118
Size
109KB
MD5
3066d1b2e84e8444082d70a1ad90c017
SHA1
3bd522bd7256095774f78ba98ea0f4085651b88a
SHA256
61ffe36301e722b85088cfceb5d5a703e57eff907119ef305dc92da45c254aaf
SHA512
84c61d702d184538cbdac5d99ae18cc9abd6aef456db3133fb1a694aca2947683f098d6601964c633c274358b9b510761e6afee8adfaea03e23609cd654a8fc9
SSDEEP
3072:OCrRG9LEWHyMp6awrpEoNLna7EP7S5p1gRk:OCrs0JaYvnDPgg2
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindFirstFileA
FindFirstFileExA
FindNextFileA
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetComputerNameA
GetComputerNameExW
GetComputerNameW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFileAttributesExW
GetFileSize
GetFileTime
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetOverlappedResult
GetProcAddress
GetProcessHeap
GetProcessTimes
GetQueuedCompletionStatus
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetSystemTimeAdjustment
GetSystemTimeAsFileTime
GetThreadTimes
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExA
GetVersionExW
GetWindowsDirectoryA
GlobalMemoryStatus
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedDecrement
InterlockedIncrement
FindClose
IsBadStringPtrW
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenEventA
OpenEventW
OpenProcess
OutputDebugStringW
PostQueuedCompletionStatus
QueryPerformanceCounter
RaiseException
ReadConsoleOutputW
ReadConsoleW
ReadFile
ReleaseMutex
ResetEvent
RtlUnwind
SetConsoleActiveScreenBuffer
SetConsoleCtrlHandler
SetConsoleCursorPosition
SetConsoleMode
SetConsoleScreenBufferSize
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFilePointerEx
SetHandleCount
SetHandleInformation
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
UpdateResourceA
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForMultipleObjectsEx
WaitForSingleObject
WaitForSingleObjectEx
WaitNamedPipeA
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcatA
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyA
lstrcpyW
lstrcpynA
lstrcpynW
lstrlenA
lstrlenW
FillConsoleOutputCharacterW
FillConsoleOutputAttribute
FileTimeToSystemTime
ExpandEnvironmentStringsW
ExitProcess
EnumSystemLocalesA
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
DecodePointer
CreateThread
CreateProcessA
CreatePipe
CreateNamedPipeA
CreateMutexA
CreateIoCompletionPort
CreateFileW
CreateFileMappingA
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryA
CreateConsoleScreenBuffer
ConnectNamedPipe
CompareStringW
CompareStringA
CloseHandle
IsBadHugeWritePtr
AddAtomA
IsCharAlphaW
LoadIconW
LoadMenuIndirectW
MessageBoxIndirectA
OemToCharW
OpenDesktopA
PeekMessageW
RegisterClassA
SendIMEMessageExW
SetClassLongA
GetWindowRgn
SetFocus
VkKeyScanExW
SwitchDesktop
SetWindowsHookExA
SetWindowPlacement
SetRect
SetMenuItemBitmaps
CharLowerBuffW
CharLowerW
GetWindowModuleFileName
GetUserObjectSecurity
GetSysColorBrush
GetPropW
GetMessagePos
GetClipCursor
GetClassLongA
SetCursor
EnumThreadWindows
EnumDisplayDevicesA
DrawCaption
DdeQueryStringW
CreatePopupMenu
CreateDialogParamW
SetMenuInfo
GetStockObject
GetObjectA
CreateSolidBrush
GetTextExtentPoint32A
CreateFontIndirectA
RegOpenKeyA
SystemFunction036
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
RegSetValueExA
RegQueryValueExA
AllocateAndInitializeSid
CopySid
EqualSid
GetLengthSid
GetUserNameA
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyA
CommandLineToArgvW
DragAcceptFiles
DragQueryFileA
DragQueryPoint
ExtractIconEx
ExtractIconExA
ExtractIconExW
ExtractIconW
FindExecutableW
SHBrowseForFolderA
SHChangeNotify
SHCreateDirectoryExA
SHCreateDirectoryExW
SHFileOperationW
SHGetDesktopFolder
SHGetDiskFreeSpaceA
SHGetDiskFreeSpaceExA
SHGetFileInfoA
SHGetIconOverlayIndexW
SHGetMalloc
SHGetSpecialFolderPathA
SHInvokePrinterCommandA
SHIsFileAvailableOffline
SHQueryRecycleBinA
SHQueryRecycleBinW
ShellAboutA
ShellExecuteExA
Shell_NotifyIconA
Shell_NotifyIcon
CoTaskMemAlloc
StrStrIA
StrStrA
StrRStrIA
StrRChrIW
StrRChrIA
StrCmpNIW
StrChrA
StrStrW
ImageList_Destroy
ImageList_DrawIndirect
ImageList_GetImageCount
ImageList_LoadImageW
ImageList_Create
ImageList_AddMasked
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ