Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftKernelCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
44cd1991346bcf0ba7fe327a72134222_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
44cd1991346bcf0ba7fe327a72134222_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
44cd1991346bcf0ba7fe327a72134222_JaffaCakes118
Size
1.2MB
MD5
44cd1991346bcf0ba7fe327a72134222
SHA1
73f46b9d3d03563df5465e86a4bade9c219a0d53
SHA256
4671e0edf3f8bbc69127a3bbe478932b56f56c23041b342883b920f3b33ff359
SHA512
3722b273d86680debcae3ed9c554082898b5b497b7bc425ac47c2e79bd81800a58235ced3cc73c47c5444e005fbe2ba5de96d4351837d30976456dd7066e91e8
SSDEEP
24576:+N+9XokUwbcWb9S1Vhstwszswj1ZcvMFpf:V9XbUw4o9SHh0wszswJZlFpf
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftKernelCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftKernelCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\XunYouPlatform2012_游戏圈子\output\xunyou.pdb
closesocket
sendto
socket
htons
inet_addr
WSAGetLastError
recvfrom
select
ioctlsocket
gethostbyname
ntohl
WSACleanup
WSAStartup
InitCommonControlsEx
_TrackMouseEvent
ImageList_Draw
ImageList_Destroy
ImageList_GetIconSize
ImageList_LoadImageA
GetProcessImageFileNameA
EnumProcessModules
GetModuleFileNameExA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
FreeLibrary
GetCurrentThreadId
LoadLibraryA
Sleep
SetLastError
GetModuleFileNameA
InitializeCriticalSection
DeleteCriticalSection
lstrcmpA
MulDiv
RaiseException
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleHandleA
SetThreadPriority
WaitForSingleObject
SuspendThread
ResumeThread
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
ExitProcess
GetProcAddress
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
DeviceIoControl
OutputDebugStringW
DeleteFileA
CreateMutexA
LoadLibraryExA
lstrcpynA
CreateProcessA
TerminateThread
CreateThread
GlobalFree
GlobalHandle
OpenProcess
GetModuleFileNameW
IsDBCSLeadByte
LocalFree
LocalAlloc
SetFilePointerEx
WriteFile
FileTimeToSystemTime
GetFileTime
GetSystemDirectoryA
WritePrivateProfileStringA
GetPrivateProfileStringA
SetEvent
CreateEventA
OpenEventA
UnmapViewOfFile
GetCPInfo
GetCurrentThread
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetProcessHeap
GetVersionExA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
ExitThread
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapReAlloc
HeapFree
HeapAlloc
RtlUnwind
HeapCreate
GetStdHandle
GetStringTypeA
GetStringTypeW
HeapSize
GetTimeZoneInformation
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
SetFilePointer
SetEndOfFile
CreateFileA
GetFileSize
ReadFile
CloseHandle
GetFileAttributesA
CreateDirectoryA
OutputDebugStringA
DebugBreak
InterlockedIncrement
GetStringTypeExW
GetStringTypeExA
GetEnvironmentVariableW
GetEnvironmentVariableA
lstrcmpiW
lstrcmpiA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetConsoleCtrlHandler
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
CompareStringW
CompareStringA
lstrlenW
lstrlenA
InterlockedDecrement
GetVersion
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GetACP
GetOEMCP
IsValidCodePage
FatalAppExitA
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetThreadLocale
InterlockedCompareExchange
IsProcessorFeaturePresent
VirtualFree
GetFileSizeEx
HeapDestroy
EqualRect
LoadMenuA
GetSubMenu
DestroyIcon
SetMenuDefaultItem
RemoveMenu
EnableMenuItem
DestroyMenu
LoadImageA
wsprintfA
IsDialogMessageA
EnableScrollBar
DrawTextW
FrameRect
SendMessageW
GetSystemMenu
TrackPopupMenu
TrackMouseEvent
GetWindowDC
MessageBoxA
EnumChildWindows
EnumWindows
DialogBoxIndirectParamA
CreateDialogParamA
GetPropW
DestroyCursor
SetCursor
OffsetRect
SetRectEmpty
SetRect
IsRectEmpty
SetDlgItemTextA
GetDlgItemTextA
EnableWindow
IsWindowVisible
LoadIconA
SetPropW
SetClassLongA
DialogBoxParamA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetActiveWindow
CreateAcceleratorTableA
RegisterClassExA
GetClassInfoExA
GetDesktopWindow
SetFocus
GetFocus
MonitorFromPoint
GetMonitorInfoA
IsIconic
DestroyAcceleratorTable
GetClassNameA
IsChild
RedrawWindow
TranslateMessage
ScreenToClient
MapDialogRect
SetWindowContextHelpId
GetSysColor
GetSystemMetrics
InflateRect
ReleaseCapture
DrawEdge
DrawFocusRect
GetCapture
GetDlgCtrlID
SetCapture
IsWindowEnabled
InvalidateRect
UpdateWindow
ClientToScreen
DestroyWindow
EndPaint
BeginPaint
EndDialog
DrawTextA
FillRect
GetForegroundWindow
GetWindowThreadProcessId
CopyRect
PeekMessageA
RegisterWindowMessageA
GetMessageA
AttachThreadInput
SetForegroundWindow
GetMessageTime
GetCursorPos
CallWindowProcA
DefWindowProcA
LoadBitmapA
PtInRect
GetParent
GetWindow
GetWindowRect
SystemParametersInfoA
MapWindowPoints
IsWindow
AdjustWindowRectEx
GetDlgItem
GetTopWindow
KillTimer
SetTimer
ShowWindow
ReleaseDC
GetDC
GetClientRect
SetWindowPos
MoveWindow
GetMenu
PostMessageA
SendMessageA
CreateWindowExA
GetWindowLongA
SetWindowLongA
CharNextA
CharUpperW
CharUpperA
CharLowerW
CharLowerA
LoadStringA
DispatchMessageA
PostQuitMessage
InvalidateRgn
CreateDialogIndirectParamA
UnregisterClassA
LoadCursorA
GetTextMetricsA
DPtoLP
SetTextColor
SetBkMode
SelectObject
CreateCompatibleDC
CreateFontIndirectA
GetTextExtentPoint32A
CreateFontW
GetStockObject
CreateSolidBrush
GetDeviceCaps
CreatePatternBrush
DeleteDC
GetObjectA
DeleteObject
CreateCompatibleBitmap
SetBkColor
ExtTextOutA
TextOutA
BitBlt
SetViewportOrgEx
SetDCBrushColor
CryptImportKey
CryptSetKeyParam
CryptDecrypt
CryptDestroyKey
CryptCreateHash
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCreateKeyExA
RegSetValueExA
CryptDeriveKey
CryptDestroyHash
CryptHashData
CryptEncrypt
CryptAcquireContextA
CryptReleaseContext
OpenSCManagerA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
CloseServiceHandle
EnumServicesStatusA
Shell_NotifyIconA
SHGetSpecialFolderPathA
ShellExecuteA
CoCreateInstance
StringFromGUID2
OleLockRunning
CoTaskMemAlloc
CoGetClassObject
CLSIDFromString
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemFree
CLSIDFromProgID
SysAllocString
SysAllocStringLen
VariantInit
VariantClear
DispCallFunc
SysStringLen
LoadTypeLi
SysStringByteLen
OleCreateFontIndirect
VarUI4FromStr
SystemTimeToVariantTime
SysFreeString
LoadRegTypeLi
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
PathFileExistsA
StrStrIA
StrRStrIA
TransparentBlt
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetSetOptionA
HttpQueryInfoA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
InternetCrackUrlA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ