Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
3ca9e71a0d87de8339670cf8d392e0a4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3ca9e71a0d87de8339670cf8d392e0a4_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
3ca9e71a0d87de8339670cf8d392e0a4_JaffaCakes118
Size
1.5MB
MD5
3ca9e71a0d87de8339670cf8d392e0a4
SHA1
0663597936e49244039bd588c74cf6868fcc7bc9
SHA256
13fd86ba3124f3ad2441375a5150cda417885d2eba24f505a0fb4cd97f4edf0b
SHA512
33dda2345ed489429b1d19282efd96a3df39e9d7523e492afc47ce4e6189cfbfad5e42c01bc7a13cb17314bcdb897b7d9218230f2c1d65900eee5e2039f46278
SSDEEP
24576:Yd6ZhzxTPPklf5Y/p1DfHzp928/G+jSBi5AaSZUu7Mj6CXdGova0o:lxTkf5Y/p1bVJvE8AapaMj6qZvar
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
HeapFree
GetProcessHeap
MultiByteToWideChar
RaiseException
InitializeCriticalSection
DeleteCriticalSection
WideCharToMultiByte
lstrlenW
GetLastError
InterlockedIncrement
InterlockedDecrement
GetProcAddress
GetModuleHandleA
lstrlenA
lstrcmpiA
CreateThread
IsDBCSLeadByte
FlushInstructionCache
lstrcmpA
MulDiv
GetModuleFileNameA
GetCurrentThreadId
SetLastError
FreeLibrary
LoadLibraryExA
MoveFileExA
DeleteFileA
LocalFree
WaitForSingleObject
SetCurrentDirectoryA
WaitForMultipleObjects
TerminateThread
Process32Next
OpenProcess
TerminateProcess
Process32First
CreateToolhelp32Snapshot
SleepEx
ExitProcess
CreateMutexA
LoadLibraryA
HeapAlloc
VerifyVersionInfoA
VerSetConditionMask
GetVersionExA
IsProcessorFeaturePresent
InterlockedCompareExchange
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
SetFileTime
FindResourceA
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStdHandle
HeapReAlloc
VirtualFree
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
RtlUnwind
GetCurrentDirectoryA
CreateDirectoryA
LocalAlloc
SizeofResource
LoadResource
GlobalAlloc
GlobalLock
LockResource
FreeResource
GlobalUnlock
GlobalFree
EnterCriticalSection
LeaveCriticalSection
InterlockedExchange
lstrcatA
GetTempPathA
CreateProcessA
Sleep
GetExitCodeProcess
SetStdHandle
WriteFile
DosDateTimeToFileTime
SystemTimeToFileTime
ReadFile
CloseHandle
CreateFileA
GetCurrentProcess
DuplicateHandle
GetFileType
SetFilePointer
GetVolumeInformationA
WriteConsoleA
GetComputerNameA
SetForegroundWindow
ShowWindow
UnregisterClassA
CreateWindowExA
SetWindowPos
EnableWindow
SendMessageA
SetWindowTextA
SetWindowLongA
GetWindowLongA
GetWindowRect
CopyRect
SetCursor
GetDlgCtrlID
BeginPaint
EndPaint
LoadCursorA
ReleaseDC
IsWindowEnabled
LoadIconA
CharNextA
DefWindowProcA
BringWindowToTop
PostQuitMessage
UpdateWindow
SystemParametersInfoA
GetMessageA
DispatchMessageA
TranslateMessage
IsDialogMessageA
MessageBoxA
FindWindowA
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
CreateAcceleratorTableA
RegisterClassExA
GetClassInfoExA
IsWindow
GetDesktopWindow
SetFocus
GetFocus
GetWindow
DestroyAcceleratorTable
CallWindowProcA
DestroyWindow
FillRect
ReleaseCapture
GetClassNameA
GetDlgItem
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
GetDC
ScreenToClient
ClientToScreen
GetClientRect
MoveWindow
GetSysColor
CreateCompatibleBitmap
SetBkMode
GetStockObject
SetBkColor
SetTextColor
BitBlt
CreateDIBSection
StretchBlt
DeleteObject
CreateSolidBrush
GetDIBColorTable
GetObjectA
SetDIBColorTable
SelectObject
DeleteDC
CreateCompatibleDC
GetDeviceCaps
LookupAccountNameA
RegEnumKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
GetUserNameA
ConvertSidToStringSidA
ord680
SHGetFolderPathA
ShellExecuteExA
ShellExecuteA
CoUninitialize
OleUninitialize
OleInitialize
CoInitialize
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CreateStreamOnHGlobal
CLSIDFromString
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
VarUI4FromStr
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
WTSFreeMemory
WTSQuerySessionInformationA
ord176
SHDeleteKeyA
AssocQueryStringA
StrStrIA
PathFileExistsA
wnsprintfA
TransparentBlt
AlphaBlend
WinVerifyTrust
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ