Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
51968ed5693506b0672654341e2f3c3e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
51968ed5693506b0672654341e2f3c3e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
51968ed5693506b0672654341e2f3c3e_JaffaCakes118
Size
1.0MB
MD5
51968ed5693506b0672654341e2f3c3e
SHA1
9131b77df88daea888c6cc02ca933d0f55191889
SHA256
7084cec1c3599690358ffe6abacd34953c31575c7ed418e525362263f85138c7
SHA512
7bef14ff98dc82825debe167c37668d589511c78d0fd728e0a290d480acf7a49e9d9cc55bc5926e39efa3ec861a9ce6e6de0e4e07d628b639f88d24009526399
SSDEEP
24576:r/C2Q8rQIzJrADKDdVesMRNpY1CHzmFRlYcEHi:rK2QAQI1r1dVesGNpYg6FRQi
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExitProcess
ExitThread
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
FileTimeToDosDateTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceA
FindResourceW
FlushConsoleInputBuffer
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
FreeResource
GetACP
GetAtomNameA
GetCPInfo
GetCommandLineA
GetCommandLineW
GetComputerNameA
GetComputerNameW
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
GetFileSizeEx
GetFileTime
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoA
GetLocaleInfoW
GetLogicalDriveStringsW
GetLogicalDrives
GetLongPathNameW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPriorityClass
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
GetPrivateProfileSectionW
GetPrivateProfileStringA
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetProcessId
GetProfileStringW
GetQueuedCompletionStatus
GetShortPathNameW
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathA
GetTempPathW
GetThreadContext
GetThreadLocale
GetThreadPriority
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetVersion
GetVersionExA
GetVersionExW
GetVolumeInformationW
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAddAtomW
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomW
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
HeapValidate
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
InterlockedPopEntrySList
EnumCalendarInfoA
IsBadReadPtr
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalSize
LockFile
LockFileEx
LockResource
MapViewOfFile
MoveFileExW
MoveFileW
MulDiv
MultiByteToWideChar
OpenEventA
OpenEventW
OpenFileMappingA
OpenFileMappingW
OpenMutexW
OpenProcess
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
Process32FirstW
Process32NextW
ProcessIdToSessionId
QueryDosDeviceW
QueryPerformanceCounter
QueryPerformanceFrequency
QueueUserAPC
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryA
RemoveDirectoryW
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
RtlUnwind
SearchPathW
SetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableW
SetErrorMode
SetEvent
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetFileTime
SetLastError
SetThreadExecutionState
SetThreadLocale
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
SignalObjectAndWait
SizeofResource
Sleep
SleepEx
SuspendThread
SwitchToThread
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnlockFile
UnlockFileEx
UnmapViewOfFile
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtect
VirtualQuery
VirtualQueryEx
WaitForMultipleObjects
WaitForMultipleObjectsEx
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteConsoleW
WriteFile
WritePrivateProfileSectionW
WritePrivateProfileStringW
WriteProcessMemory
lstrcatW
lstrcmpA
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
SetHandleCount
GetEnvironmentStrings
FreeEnvironmentStringsA
EnterCriticalSection
EncodePointer
DuplicateHandle
DosDateTimeToFileTime
DeviceIoControl
DeleteFileW
DeleteFileA
DeleteCriticalSection
DecodePointer
CreateWaitableTimerW
CreateWaitableTimerA
CreateToolhelp32Snapshot
CreateThread
CreateSemaphoreW
CreateSemaphoreA
CreateRemoteThread
CreateProcessW
CreateProcessA
CreatePipe
CreateMutexW
CreateMutexA
CreateIoCompletionPort
CreateHardLinkA
CreateFileW
CreateFileMappingW
CreateFileMappingA
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryW
CreateDirectoryA
CopyFileW
CopyFileA
CompareStringW
CompareStringA
CompareFileTime
CloseHandle
CancelWaitableTimer
Beep
AreFileApisANSI
InterlockedPushEntrySList
AddVectoredExceptionHandler
InSendMessage
DestroyMenu
GetParent
GetWindowContextHelpId
GetMenuContextHelpId
LoadCursorFromFileW
GetCaretBlinkTime
IsCharLowerW
IsWindowUnicode
GetKeyboardType
VkKeyScanA
GetKeyboardLayout
wsprintfW
keybd_event
UnregisterHotKey
UnhookWindowsHookEx
ShowCaret
SetWindowsHookExW
AnyPopup
SetKeyboardState
SetForegroundWindow
SetDeskWallpaper
SendDlgItemMessageW
RegisterWindowMessageW
RegisterHotKey
PostMessageW
OemToCharW
MapVirtualKeyExA
LoadStringW
IsCharAlphaNumericA
InvertRect
InvalidateRect
GetWindowThreadProcessId
GetWindowRgn
GetUpdateRect
GetMonitorInfoW
GetMenuState
GetLastActivePopup
GetOpenClipboardWindow
GetMessageExtraInfo
IsIconic
LoadIconA
SetProcessDefaultLayout
GetKeyState
GetForegroundWindow
GetDlgItemTextW
GetDlgItem
GetClipboardSequenceNumber
GetAsyncKeyState
EnumDisplayMonitors
EndDialog
EnableWindow
DlgDirListW
DialogBoxParamW
DestroyIcon
CharUpperW
CallNextHookEx
AttachThreadInput
GetSysColorBrush
EngDeleteSemaphore
ExcludeClipRect
GdiConvertEnhMetaFile
GdiEntry16
GdiPlayEMF
GetArcDirection
GetDCBrushColor
GetDIBits
GetLogColorSpaceA
GetMetaFileA
GetMetaFileW
GetWinMetaFileBits
Pie
PolyTextOutA
Polyline
RoundRect
EngComputeGlyphSet
SetDCBrushColor
SetDCPenColor
SetDIBitsToDevice
SetFontEnumeration
GetStockObject
CloseFigure
CreateMetaFileW
UnrealizeObject
CreateSolidBrush
GetBkColor
EndDoc
UpdateColors
GetTextCharset
GetGraphicsMode
GetTextAlign
EngCheckAbort
DeviceCapabilitiesExW
STROBJ_bGetAdvanceWidths
CreateColorSpaceA
DeleteObject
RegOpenKeyExA
OpenProcessToken
RegQueryValueExW
CommandLineToArgvW
ExtractIconExW
SHGetFileInfoW
SHGetFolderPathW
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ