Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
31d1384cc0ec19466d8ee806a575c02c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
31d1384cc0ec19466d8ee806a575c02c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
31d1384cc0ec19466d8ee806a575c02c_JaffaCakes118
Size
562KB
MD5
31d1384cc0ec19466d8ee806a575c02c
SHA1
cdb4e7ece0910b7afb14aecec37c3f16dd9517f5
SHA256
061255ab982d03060588df9a17567a8e9f6f5527a143946a894b0f6927203b7a
SHA512
ddeb2cb8768bd595d194ee2d1ba808488b287277299260a639ba7f2f9964ecc0a43c60057f8e781f5ad2d274b726cd75532e9b697c0f9e42b22ca0ca7e013570
SSDEEP
12288:FEyIff1rbFuH0I6m6+mCvCPncPUPZ8ujSLhd6Blv4F2KyMm/weM:GR1rpum5V3PncqZ8x/FJyMm
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateEventW
CreateWaitableTimerW
SetWaitableTimer
LoadLibraryW
LoadLibraryExW
GetModuleFileNameW
GetModuleHandleW
CreateProcessW
GetCommandLineW
GetWindowsDirectoryW
DeleteFileW
CopyFileW
MoveFileExW
GetComputerNameW
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetTickCount
GetStartupInfoW
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
lstrlenA
SetEndOfFile
WaitForSingleObject
ReleaseMutex
SetEvent
LeaveCriticalSection
EnterCriticalSection
SetErrorMode
GetCurrentThreadId
GetExitCodeProcess
TerminateProcess
GetCurrentProcess
OpenProcess
LocalFree
LocalAlloc
GetProcAddress
FreeLibrary
InterlockedCompareExchange
InterlockedExchange
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
GetFileAttributesW
CreateFileW
CreateDirectoryW
GetCurrentDirectoryW
LocalFileTimeToFileTime
SystemTimeToFileTime
CloseHandle
SetFileTime
LockResource
SetFilePointer
ReadFile
CreateMutexW
WideCharToMultiByte
MultiByteToWideChar
FindResourceExW
FindResourceW
SizeofResource
LoadResource
GetLastError
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
ReadConsoleW
WriteConsoleW
SetStdHandle
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetCPInfo
ReleaseSemaphore
DuplicateHandle
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
lstrcmpiW
FileTimeToSystemTime
GetFileTime
SetFilePointerEx
GetFileType
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetOEMCP
GetACP
IsValidCodePage
GetCurrentThread
GetStdHandle
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
Sleep
WriteFile
WaitForMultipleObjects
IsDebuggerPresent
OutputDebugStringW
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
IsProcessorFeaturePresent
RtlUnwind
CreateThread
ExitThread
CreateTimerQueue
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
CreateSemaphoreW
LoadStringW
MessageBoxW
CharNextW
CharUpperW
PostThreadMessageW
DispatchMessageW
TranslateMessage
GetMessageW
StartServiceW
ConvertSidToStringSidW
CryptDuplicateKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptGetHashParam
CryptDestroyKey
CryptDeriveKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerW
QueryServiceStatus
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
CreateProcessAsUserW
LookupAccountNameW
LookupAccountSidW
IsValidSid
GetTokenInformation
OpenProcessToken
ReportEventW
RegisterEventSourceW
DeregisterEventSource
SHGetFolderPathW
CoAddRefServerProcess
CoReleaseServerProcess
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
StringFromCLSID
CLSIDFromString
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoInitializeEx
CoTaskMemAlloc
VarUI4FromStr
VariantClear
SysAllocStringLen
SysFreeString
SysAllocString
PathAppendW
PathCombineW
PathRemoveArgsW
PathRemoveExtensionW
PathRemoveFileSpecW
PathRenameExtensionW
PathStripPathW
PathUnquoteSpacesW
PathFileExistsW
CryptBinaryToStringA
CryptStringToBinaryA
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpOpenRequest
WinHttpCrackUrl
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
CheckSumMappedFile
GetModuleFileNameExW
GetTcpTable
GetUdpTable
ntohs
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ