Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
49d765b4d93c38ce08cb9d38f21ac442_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
49d765b4d93c38ce08cb9d38f21ac442_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
49d765b4d93c38ce08cb9d38f21ac442_JaffaCakes118
Size
1.8MB
MD5
49d765b4d93c38ce08cb9d38f21ac442
SHA1
15b1d7a92a53307b660affbd98f77c8a4aaa2345
SHA256
e15ab0fb226c1fb362ca69c5c8f7ea2d8cef06b69c1e793d6c796837cc8537ab
SHA512
15603baea1e0640026eb77bf57a05a9e9ddf877d97c83a917a60bdc18faa2205b027bad6b80a7aaf64639cec372fa824c894b1fc3063aa8ed249dcc40f496a17
SSDEEP
49152:5HY3R91lpI06JeUrVTQCWnU/Kr2qI/kycvD:5HY3RHI06JxVT8U/dN/9Q
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadResource
WideCharToMultiByte
SizeofResource
GetFileAttributesA
MultiByteToWideChar
LockResource
Process32First
OpenProcess
Process32Next
CreateToolhelp32Snapshot
LocalFree
SignalObjectAndWait
UnregisterWait
GetThreadPriority
GetTimeZoneInformation
RegisterWaitForSingleObject
FindResourceA
TerminateProcess
InterlockedDecrement
Sleep
ExitProcess
GetTempPathA
GetCurrentProcessId
GetVersionExA
CreateMutexA
GetTempFileNameA
GetVolumeInformationA
GetComputerNameA
DeleteFileA
CloseHandle
GetLocalTime
GetLastError
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
SetThreadPriority
CreateEventW
SetEvent
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
SwitchToThread
SetThreadAffinityMask
GetProcessAffinityMask
DeleteTimerQueueTimer
CreateDirectoryA
GetExitCodeProcess
GetTickCount
WaitForSingleObject
HeapFree
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapAlloc
GetCPInfo
ReadFile
GetConsoleMode
ReadConsoleW
SetFilePointer
WriteFile
GetConsoleCP
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetProcessHeap
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
SetFilePointerEx
FlushFileBuffers
HeapSize
SetLastError
InterlockedIncrement
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameW
RaiseException
IsValidCodePage
GetACP
GetOEMCP
GetStringTypeW
CreateFileW
GetModuleHandleW
SetStdHandle
WriteConsoleW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreW
RtlUnwind
HeapReAlloc
InterlockedExchange
FreeLibrary
LoadLibraryExW
OutputDebugStringW
LoadLibraryW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetEndOfFile
DuplicateHandle
GetExitCodeThread
lstrlenA
CreateTimerQueue
CreateTimerQueueTimer
ExitThread
CreateThread
SetEnvironmentVariableA
EnumWindows
IsWindow
GetWindowThreadProcessId
IsWindowVisible
GetClassNameA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
FreeSid
AllocateAndInitializeSid
RegQueryValueA
LookupAccountSidA
EqualSid
GetTokenInformation
ConvertSidToStringSidA
OpenProcessToken
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
ShellExecuteW
SHFileOperationA
SHGetFolderPathA
ShellExecuteExA
CoSetProxyBlanket
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
CoUninitialize
SysAllocString
VariantClear
VariantInit
SysFreeString
StrStrIA
PathFileExistsA
wnsprintfA
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetOpenUrlA
ord22
ord20
ord23
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ