Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
394f404df687e54c78ef3a874bf80b73_JaffaCakes118.exe
Resource
win7-20240220-en
Target
394f404df687e54c78ef3a874bf80b73_JaffaCakes118
Size
2.8MB
MD5
394f404df687e54c78ef3a874bf80b73
SHA1
9d5d5336b4ae8ad9266ce7f844c1800bf652a2a4
SHA256
493b472ec41b3387dff95f8c4d0eb8b86e948bdc1457ac5c0f6767d587745658
SHA512
0cf5701f6b3bf60aab6c1381a42fc463c3e9e9e6f31b805ee35afcca926f2a297dbfba442909becf005b2c3248eeedf46a293efbfe6e83559a17d4bebf3d0ef4
SSDEEP
49152:GTIYOHFEa7iYDYdPNvMNTa6QZE9iA6olsBXp9XfaB4zI+thNgYNPG9xjizvtrV:GT7ueaeYylMwZYiA6fCoVNe9xjizvpV
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
MoveFileA
DuplicateHandle
CreateProcessA
GetCurrentThreadId
GetFileSize
FindFirstFileW
FindResourceExW
LoadResource
InterlockedDecrement
GetCurrentProcess
WriteFile
GetUserDefaultLangID
OpenProcess
WideCharToMultiByte
Sleep
GetVersionExW
GetFileAttributesW
ReadFile
GetModuleFileNameW
CreateFileW
MultiByteToWideChar
lstrlenW
GetLastError
GetCurrentDirectoryW
GetLongPathNameW
GetProcAddress
FindClose
Process32FirstW
RemoveDirectoryW
QueryDosDeviceW
Module32FirstW
GetSystemInfo
Process32NextW
FindNextFileW
CreateToolhelp32Snapshot
Module32NextW
CloseHandle
SetFileAttributesW
CreateMutexW
WaitForSingleObject
ReleaseMutex
CreateThread
SetFilePointer
GetDriveTypeW
CreateDirectoryW
LoadLibraryW
FlushFileBuffers
CreateProcessW
CopyFileW
GetExitCodeProcess
DecodePointer
EncodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetSystemTimeAsFileTime
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteFileA
HeapFree
IsProcessorFeaturePresent
GetStdHandle
GetLocaleInfoW
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
FreeLibrary
LCMapStringW
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetStdHandle
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
LocalFree
GetModuleFileNameA
LoadLibraryA
FormatMessageA
FindResourceW
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetFullPathNameW
GetTimeFormatA
GetDateFormatA
GetFileAttributesA
CreateFileA
CreatePipe
SetEndOfFile
GetProcessHeap
DeleteFileW
GetSystemDirectoryW
GetModuleHandleW
HeapAlloc
GetEnvironmentVariableW
LoadIconW
CreateDialogParamW
ShowWindow
IsDialogMessageW
TranslateMessage
PostMessageW
GetMessageW
IsWindow
SetWindowTextW
DispatchMessageW
GetSystemMetrics
CallNextHookEx
GetDlgItem
SetWindowsHookExW
UnhookWindowsHookEx
MessageBoxW
SetDlgItemTextW
SendMessageW
DestroyWindow
SHGetFolderPathW
SHFileOperationW
SHCreateDirectoryExW
ShellExecuteW
ord165
SHDeleteKeyW
PathRemoveFileSpecW
ord113
RegEnumKeyExW
RegOpenKeyExW
FreeSid
AllocateAndInitializeSid
RegDeleteKeyW
RegEnumKeyW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegSetValueExW
CheckTokenMembership
CoInitializeEx
CoInitialize
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoCreateGuid
StringFromGUID2
CreateStreamOnHGlobal
SysFreeString
SysAllocString
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ