Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
4ec75f2c118f946d980d3d0e6b3f0e62_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4ec75f2c118f946d980d3d0e6b3f0e62_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
4ec75f2c118f946d980d3d0e6b3f0e62_JaffaCakes118
Size
490KB
MD5
4ec75f2c118f946d980d3d0e6b3f0e62
SHA1
742ab134e95594e9c445d759ce3290f72f47111b
SHA256
3beaa08903783d8f31f16e7d87289a6a76deaf7fcc7d94d872e22a6c955f7ae3
SHA512
23d0d3973aea9605f3debeab630ad7e13b13408c196e997f293d33a616a94560a6e3799f548d605d552235ffcda4a204127a2e57a7095bb61d2490e13d70a020
SSDEEP
12288:qac5YyBjTLc5BSP66vWzlUJe/t8Vyss5BNl6AIst:R4IY+zlOoHzdl6AVt
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
lstrcmpA
MulDiv
lstrlenA
InterlockedIncrement
InterlockedDecrement
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
WinExec
lstrcmpW
GetVersionExA
OutputDebugStringW
LocalFree
LocalAlloc
TerminateProcess
WritePrivateProfileStringA
GetPrivateProfileIntA
GetPrivateProfileStringA
WaitForSingleObject
CreateProcessA
InitializeCriticalSection
CreateMutexA
ExitProcess
ReleaseMutex
InterlockedPopEntrySList
VirtualFree
InterlockedPushEntrySList
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
IsValidCodePage
GetOEMCP
GetACP
HeapReAlloc
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WriteFile
SetHandleCount
HeapCreate
IsProcessorFeaturePresent
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCPInfo
LCMapStringW
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetDateFormatA
GetTimeFormatA
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
GetModuleFileNameW
GetStdHandle
GetFileType
WriteConsoleW
HeapAlloc
GetSystemTimeAsFileTime
HeapFree
RtlUnwind
InterlockedCompareExchange
DecodePointer
EncodePointer
InterlockedExchange
lstrlenW
LoadLibraryW
WideCharToMultiByte
RaiseException
Sleep
GetLastError
GetCurrentProcessId
GetModuleFileNameA
CreateToolhelp32Snapshot
Process32First
CloseHandle
Process32Next
SetLastError
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
GetTimeZoneInformation
LeaveCriticalSection
FindNextFileA
MultiByteToWideChar
GetModuleHandleA
GetProcAddress
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
VirtualFreeEx
GetTempPathA
FindClose
GetTempFileNameA
FindFirstFileA
FreeEnvironmentStringsW
GetDC
ReleaseDC
RegisterClassA
DefWindowProcA
TrackPopupMenu
AppendMenuA
SetWindowLongA
GetCursorPos
DestroyWindow
SetWindowPos
GetWindowThreadProcessId
SendMessageA
ShowWindow
IsWindowVisible
SetTimer
KillTimer
FindWindowA
LoadCursorA
SetCursor
FindWindowExA
UpdateLayeredWindow
GetSystemMetrics
RegisterClassExA
PostQuitMessage
GetWindowLongA
CallWindowProcA
PostMessageA
GetWindowRect
MoveWindow
IsWindow
LoadImageA
GetSysColor
CharNextA
GetClientRect
ClientToScreen
ScreenToClient
InvalidateRect
InvalidateRgn
RedrawWindow
SetCapture
IsChild
GetParent
GetDlgItem
GetClassNameA
ReleaseCapture
FillRect
EndPaint
CreatePopupMenu
PtInRect
CreateWindowExA
SystemParametersInfoA
GetForegroundWindow
AttachThreadInput
GetShellWindow
WindowFromPoint
GetClassInfoExA
BeginPaint
DestroyAcceleratorTable
GetWindow
GetFocus
SetFocus
GetDesktopWindow
SetForegroundWindow
wsprintfW
GetMessageA
DispatchMessageA
TranslateMessage
SetActiveWindow
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
CreateAcceleratorTableA
UnregisterClassA
GetDeviceCaps
BitBlt
CreateCompatibleBitmap
CreateSolidBrush
DeleteObject
CreateDIBSection
SelectObject
CreateCompatibleDC
GetObjectA
DeleteDC
GetStockObject
RegEnumKeyExA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
RegQueryInfoKeyW
SHGetSpecialFolderPathA
Shell_NotifyIconA
CommandLineToArgvW
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
StgCreateDocfile
OleCreate
CoTaskMemRealloc
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CoGetClassObject
CoTaskMemAlloc
OleLockRunning
StringFromGUID2
CoCreateInstance
CoInitialize
CoTaskMemFree
CoUninitialize
CLSIDFromProgID
SysStringLen
VariantInit
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
GdipFree
GdiplusStartup
GdipCloneImage
GdipDrawImageRectI
GdipFillRectangleI
GdipGraphicsClear
GdipDrawLineI
GdipCreateFromHDC
GdipCreateSolidFill
GdipCreateBitmapFromFile
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipDeletePen
GdipCreatePen1
GdipDeleteBrush
GdipAlloc
InternetCrackUrlA
InternetOpenA
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
HttpQueryInfoA
InternetReadFileExA
InternetCloseHandle
StrStrIA
PathFileExistsA
_TrackMouseEvent
InitCommonControlsEx
Netbios
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
MakeSureDirectoryPathExists
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ