Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
36650cc4f12189cc7275aa55e54554ef_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
36650cc4f12189cc7275aa55e54554ef_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
36650cc4f12189cc7275aa55e54554ef_JaffaCakes118
Size
826KB
MD5
36650cc4f12189cc7275aa55e54554ef
SHA1
dd4c45b048ab36d542473afdb8bff7dc7d952b7d
SHA256
d952304fd0ca3acc1230c11d5b7e6d2207699b6c7995402692ed9ba2b3f6e6c5
SHA512
ce113064c3f554c411b268a8a5c149d95a40a7262f2a212d10c743b06fb1df88f72f0ece5daca301b0b9dbb357593f2a240614a37211e25cbc41544c13b12244
SSDEEP
24576:KGWKz8HdK6fc73HVycJUGMIZZDp1zUlg1:2K83073HVycJUGMIZXFUlm
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\work\git\binaries\Installer\Release\ZonaInstaller.pdb
IsThemeActive
DrawThemeBackground
OpenThemeData
DrawThemeText
StrToIntW
wnsprintfW
PathIsDirectoryW
ord12
GdipCreateBitmapFromStream
GdipFree
GdipDeletePen
GdipAlloc
GdipLoadImageFromStream
GdipCreatePen1
GdipCreateFromHDC
GdipDrawLineI
GdipGetImageBounds
GdiplusStartup
GdipCloneImage
GdipDeleteGraphics
GdipDrawImageRectI
GdipDisposeImage
SystemTimeToFileTime
GetCurrentProcess
GetLogicalDriveStringsW
CreateDirectoryW
GlobalLock
GetModuleHandleW
WriteFile
GlobalAlloc
WideCharToMultiByte
Sleep
SizeofResource
GetVersionExW
GetExitCodeProcess
GetFileAttributesW
TerminateProcess
ReadFile
GetModuleFileNameW
CreateFileW
MultiByteToWideChar
GlobalUnlock
GetTempPathW
GetFileSizeEx
GetLongPathNameW
SetLastError
GetProcAddress
GlobalFree
FindClose
Process32FirstW
LocalAlloc
RemoveDirectoryW
CreatePipe
Process32NextW
GetModuleHandleA
FindNextFileW
CreateToolhelp32Snapshot
GetShortPathNameW
GetDiskFreeSpaceExW
DeleteFileW
LocalFree
GetSystemTime
SetFileAttributesW
ExpandEnvironmentStringsW
GetSystemDefaultLangID
GetUserDefaultLangID
FreeResource
GetFileSize
InitializeCriticalSection
FormatMessageW
LeaveCriticalSection
GetExitCodeThread
DeleteCriticalSection
lstrlenW
CreateProcessW
GetCurrentDirectoryW
LocalFileTimeToFileTime
CreateThread
GlobalMemoryStatusEx
GetCurrentProcessId
VerSetConditionMask
VerifyVersionInfoW
GetWindowsDirectoryW
GetVolumeInformationW
LockResource
InterlockedCompareExchange
SetEnvironmentVariableA
SetEnvironmentVariableW
CompareStringW
GetTimeZoneInformation
GetProcessHeap
SetEndOfFile
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
WriteConsoleW
LoadLibraryW
InterlockedExchange
LCMapStringW
FlushFileBuffers
GetStringTypeW
CreateFileA
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
HeapSize
RtlUnwind
GetTickCount
QueryPerformanceCounter
HeapDestroy
HeapCreate
GetDriveTypeW
SetFilePointer
FindFirstFileW
GetTempFileNameW
CloseHandle
GetLastError
WaitForSingleObject
LoadResource
FindResourceW
FindResourceExW
TerminateThread
SetFileTime
CreateMutexW
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
HeapFree
lstrlenA
GetStartupInfoW
FindFirstFileExW
HeapSetInformation
GetCommandLineW
EncodePointer
EnterCriticalSection
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
GetStdHandle
IsProcessorFeaturePresent
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ExitProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
DecodePointer
GetDesktopWindow
MessageBoxW
GetSystemMetrics
DrawTextW
SendMessageW
CallWindowProcW
DispatchMessageW
BeginPaint
UpdateWindow
CreateWindowExW
SetWindowPos
SetWindowLongW
GetWindowLongW
LoadIconW
RegisterClassExW
LoadAcceleratorsW
TranslateMessage
GetClientRect
LoadCursorW
PostQuitMessage
GetMessageW
EndPaint
DefWindowProcW
InvalidateRect
GetWindowTextW
EnableWindow
SetWindowTextW
ShowWindow
DestroyWindow
PostMessageW
GetWindowRect
GetClassInfoW
GetDC
ReleaseDC
DrawStateW
DrawFrameControl
wsprintfW
TranslateAcceleratorW
SetTextAlign
SetTextColor
SetBkMode
GetTextColor
GetTextExtentPoint32W
CreateFontW
DeleteDC
SelectObject
CreateCompatibleDC
TextOutW
GetUserNameA
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyW
RegQueryValueExW
EqualSid
RegCreateKeyExW
GetTokenInformation
OpenProcessToken
SHChangeNotify
SHGetFolderPathW
ShellExecuteW
ord165
CommandLineToArgvW
ShellExecuteExW
SHCreateDirectoryExW
SHFileOperationW
OleRun
CLSIDFromProgID
CoInitializeSecurity
CoSetProxyBlanket
CreateStreamOnHGlobal
CoCreateGuid
StringFromGUID2
CoCreateInstance
CoInitialize
CoUninitialize
InternetSetOptionW
InternetSetCookieW
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetQueryOptionW
InternetCrackUrlW
HttpOpenRequestW
HttpSendRequestW
InternetConnectW
HttpAddRequestHeadersW
HttpQueryInfoW
SysAllocString
VariantClear
SysFreeString
GetErrorInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ