Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
51f0e237978d8a8649ee1ac7f0a8108c_JaffaCakes118.exe
Resource
win7-20240221-en
Target
51f0e237978d8a8649ee1ac7f0a8108c_JaffaCakes118
Size
918KB
MD5
51f0e237978d8a8649ee1ac7f0a8108c
SHA1
b61c903ea11cbe5930220b4f150ac388385ef1c3
SHA256
e366c18e2f2389d4e90386f01876174074019a021b6eacfceb187aaa53560078
SHA512
1f918b471cf53202c5cec4c36dfcdfab6313cd9c115e6c9d904e041e977a8853cee70e69f129e63361e7d41faee905fd22d701a2b92075d20590bc89c9d07368
SSDEEP
6144:W3bDksaZLLP8OvtzpfzzlPFAAfwG44X0m+Z1Af61g8nKB17M1hRJF:8vksaZLwOvTzRP6Af44ajACi8Kr7M1n
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetVersion
LoadLibraryA
VirtualAlloc
VirtualFree
VirtualProtect
GetModuleHandleA
GetTickCount
GetSystemTimeAsFileTime
GetConsoleTitleA
GetTempFileNameW
LZCopy
FindNextFileA
GetThreadLocale
InterlockedPushEntrySList
CreateActCtxA
GetTapeStatus
MapUserPhysicalPagesScatter
SetInformationJobObject
FindNextVolumeW
GetAsyncKeyState
GetUpdateRgn
GetClipCursor
GetInputDesktop
DrawCaption
CloseClipboard
IsWindowVisible
CopyAcceleratorTableA
DdeCmpStringHandles
GetKeyboardState
DdeDisconnectList
RegisterClipboardFormatA
SetWindowsHookA
ReplyMessage
GetAltTabInfoA
GetAltTabInfoW
DrawStateW
GetWindowPlacement
GetKeyboardLayout
CreateDialogIndirectParamA
MessageBoxW
GetKeyboardType
WINNLSEnableIME
CsrBroadcastSystemMessageExW
GetKeyState
OemToCharBuffW
MsgWaitForMultipleObjects
PackDDElParam
LoadMenuIndirectW
BroadcastSystemMessage
GetMouseMovePointsEx
DrawTextExA
ValidateRgn
StrChrIA
SHCreateFileExtractIconW
StrStrA
SHGetSetSettings
SHGetDesktopFolder
SHGetNewLinkInfo
ILAppendID
PifMgr_SetProperties
SHFreeNameMappings
ILIsEqual
StrNCmpIA
DAD_AutoScroll
IsLFNDriveA
SHCreateQueryCancelAutoPlayMoniker
DAD_SetDragImage
ExtractAssociatedIconExW
PathYetAnotherMakeUniqueName
SHOpenFolderAndSelectItems
ShellExecuteEx
Control_RunDLLA
SHGetDiskFreeSpaceA
SHGetFolderPathA
RealShellExecuteA
IsNetDrive
SHFileOperationA
SHGetIconOverlayIndexA
SHChangeNotification_Unlock
StrRChrW
SHPropStgCreate
UninitializeFlatSB
FlatSB_GetScrollProp
DestroyPropertySheetPage
SetWindowSubclass
ImageList_SetIconSize
ImageList_SetFilter
ImageList_DrawEx
ImageList_Replace
CreatePropertySheetPageW
ImageList_DrawIndirect
ImageList_GetIconSize
ImageList_GetImageCount
DPA_Sort
CreateStatusWindowW
ImageList_Draw
CreateUpDownControl
CreateStatusWindowA
CreateToolbarEx
FlatSB_GetScrollPos
DSA_Destroy
GetEffectiveClientRect
FlatSB_SetScrollRange
DrawStatusTextW
ImageList_GetImageRect
FlatSB_SetScrollInfo
AddMRUStringW
VarMod
VarAnd
VarSub
VARIANT_UserSize
VarBoolFromI1
VarOr
VarBoolFromI2
VarI8FromI1
GetActiveObject
DllGetClassObject
VarI2FromI1
OaBuildVersion
VarR4CmpR8
BSTR_UserFree
DllRegisterServer
VariantCopyInd
VarI1FromCy
VarR8FromDec
GetAltMonthNames
VarCyNeg
VarDateFromUI1
VarDecFromI2
LHashValOfNameSysA
OleCreateFontIndirect
SysFreeString
VarDecFromR4
VarBstrFromUI4
VarCyFromStr
BstrFromVector
DocumentPropertiesA
QueryColorProfile
ConnectToPrinterDlg
AddPrinterDriverW
DeletePrinterDataA
FlushPrinter
PrinterMessageBoxA
EnumJobsW
EnumFormsA
DeleteMonitorA
AddFormW
EnumMonitorsA
EnumPrinterKeyW
GetPrinterW
AbortPrinter
PerfOpen
PerfClose
GetPrinterDriverDirectoryA
DeletePrinterIC
EnumPrintersW
GetPrintProcessorDirectoryA
AdvancedDocumentPropertiesA
GetPrinterDriverDirectoryW
SpoolerPrinterEvent
AddMonitorW
EnumPrinterDataExA
AddPrinterW
EnumPrintProcessorDatatypesW
OpenPrinterW
WmiReceiveNotificationsA
FileEncryptionStatusW
UpdateTraceA
FindFirstFreeAce
InitiateSystemShutdownW
UnregisterIdleTask
SaferiIsExecutableFileType
RegQueryMultipleValuesA
SystemFunction003
RegisterEventSourceW
RegSaveKeyExW
GetTrusteeFormW
SaferGetLevelInformation
InitializeSecurityDescriptor
ConvertSecurityDescriptorToAccessW
RegQueryValueExW
RegDisablePredefinedCacheEx
CredReadA
RegNotifyChangeKeyValue
WmiExecuteMethodA
CryptImportKey
ClearEventLogA
LookupSecurityDescriptorPartsW
ConvertSecurityDescriptorToAccessNamedA
CredEnumerateA
SystemFunction028
ElfBackupEventLogFileW
DeregisterEventSource
LsaSetQuotasForAccount
ConvertAccessToSecurityDescriptorA
CryptSetProviderExA
ConvertSecurityDescriptorToStringSecurityDescriptorA
BuildTrusteeWithObjectsAndSidW
RegQueryValueExA
ObjectOpenAuditAlarmA
GetWindowsAccountDomainSid
SetEntriesInAccessListW
EnumServicesStatusExW
SystemFunction032
AllocateAndInitializeSid
CredGetTargetInfoW
LsaSetSystemAccessAccount
mmioFlush
waveInGetDevCapsA
mciLoadCommandResource
mci32Message
waveOutPause
midiOutLongMsg
mixerMessage
midiInStop
waveOutBreakLoop
mmioInstallIOProcW
DefDriverProc
mmioCreateChunk
mixerGetDevCapsA
auxOutMessage
waveOutGetPitch
mixerOpen
waveInGetID
joySetCapture
wod32Message
midiStreamProperty
waveOutOpen
waveOutGetErrorTextW
midiOutMessage
midiStreamPosition
midiOutSetVolume
joyGetThreshold
mciGetDriverData
waveInReset
midiOutCacheDrumPatches
waveInGetNumDevs
mixerGetControlDetailsW
PlaySound
midiStreamClose
sndPlaySoundA
mixerGetNumDevs
SymGetLineFromName
SymUnloadModule64
SymGetModuleInfo64
SymEnumerateModules
ImageRvaToVa
UnDecorateSymbolName
SymLoadModule
ImageLoad
EnumerateLoadedModules64
TouchFileTimes
FindFileInSearchPath
SearchTreeForFile
SymSetOptions
SymGetSymFromName
FindDebugInfoFile
ImageNtHeader
ImageRvaToSection
ImagehlpApiVersionEx
MapAndLoad
SymMatchFileName
ImagehlpApiVersion
SymGetLinePrev64
ReBaseImage
GetImageConfigInformation
GetTimestampForLoadedLibrary
StackWalk
SymGetModuleInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ