Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
4f3f4287b1e41dd40ee6d3271c60949f_JaffaCakes118.exe
Resource
win7-20240508-en
Target
4f3f4287b1e41dd40ee6d3271c60949f_JaffaCakes118
Size
1.0MB
MD5
4f3f4287b1e41dd40ee6d3271c60949f
SHA1
72a8490fb212d23e9cfde5bda851dcb1d7c1d895
SHA256
f3e3d35760f655af5a57029b73c2cc2f42d09de1a694b2eb22366a3e6c49a068
SHA512
5610668cf8c495b27b60bef35414c009c220ae6373b70617dd06ae4ec35f291d0a02170ad8f35996ed327e6f06aa5d4dc824fac3f8a462e2867eb742cd799df4
SSDEEP
12288:nVbaHbD19/nXEx5xuzi6AoS5qt4cW+EEFsfZdGvvOWTbb:nZ+bh9cTottW+jKZI3OWTX
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetVersion
LoadLibraryA
VirtualAlloc
VirtualFree
VirtualProtect
GetModuleHandleA
lstrcmpA
VerLanguageNameA
GetPrivateProfileStringW
lstrcpy
FindNextVolumeA
GetThreadPriority
SetTapePosition
EnumCalendarInfoExA
GetStdHandle
GetNumaHighestNodeNumber
FindResourceW
CreateIoCompletionPort
WriteProfileStringA
PulseEvent
LoadLibraryW
GetWindowDC
DisplayExitWindowsWarnings
ImpersonateDdeClientWindow
UnregisterMessagePumpHook
ValidateRect
BuildReasonArray
DdeQueryNextServer
DefRawInputProc
GetMenuInfo
LoadRemoteFonts
GetWindowTextA
GetCursor
CreateWindowExW
DrawTextA
CallMsgFilterA
GetCursorFrameInfo
RegisterLogonProcess
ToUnicode
RegisterDeviceNotificationA
CreatePopupMenu
UnlockWindowStation
TranslateAccelerator
DefMDIChildProcW
CloseClipboard
SetMenuItemInfoW
InvalidateRgn
MessageBoxExW
CopyRect
GdipTransformPoints
GdipSetPathGradientSurroundColorsWithCount
GdipAddPathClosedCurveI
GdipSetPenMode
GdipAddPathCurve2
GdipCreatePath
GdipAddPathRectangleI
GdipBitmapGetPixel
GdipGetPenStartCap
GdipSetPathGradientCenterColor
GdipGetPathGradientSurroundColorsWithCount
GdipIsVisibleRect
GdipCreateCachedBitmap
GdipGetStringFormatDigitSubstitution
GdipCreateMetafileFromStream
GdipCreateMatrix3
GdipGetFontCollectionFamilyList
GdipResetPenTransform
GdipGetPropertySize
GdipGetMetafileHeaderFromEmf
GdipCloneFont
GdipDrawBezierI
GdipCreateLineBrushFromRectWithAngleI
GdipGetAdjustableArrowCapWidth
GdipAddPathPolygon
GdipGetFamilyName
GdipAddPathStringI
GdipResetClip
SymLoadModule64
SymGetLineNext
SymMatchString
ImageAddCertificate
SymSetSearchPath
SymGetSymNext64
SymInitialize
SymGetLineFromName64
SplitSymbols
ImageGetDigestStream
ImagehlpApiVersionEx
SymGetLineFromName
ImagehlpApiVersion
ImageRvaToSection
SymGetLineFromAddr
GetImageUnusedHeaderBytes
SymGetSymFromAddr64
MapFileAndCheckSumW
SymLoadModule
SymEnumerateModules
SymFindFileInPath
SymEnumerateSymbols64
ImageLoad
ImageRemoveCertificate
BindImage
RealShellExecuteExA
StrRChrA
StrChrW
SHDestroyPropSheetExtArray
SHGetFolderPathW
SHCreateDirectoryExA
PathMakeUniqueName
ExtractIconW
SHGetMalloc
PifMgr_OpenProperties
ILRemoveLastID
SHGetRealIDL
ILFindLastID
ExtractAssociatedIconA
DragAcceptFiles
SHStartNetConnectionDialogW
StrRStrIA
SHAppBarMessage
DragQueryFileA
SHGetPathFromIDList
IsLFNDrive
SHBrowseForFolder
SHLoadNonloadedIconOverlayIdentifiers
OleUIPasteSpecialA
OleUIChangeSourceW
OleUICanConvertOrActivateAs
OleUIPromptUserA
OleUIConvertA
OleUIChangeSourceA
OleUIObjectPropertiesW
OleUIChangeIconA
OleUIObjectPropertiesA
OleUIInsertObjectW
OleUIAddVerbMenuW
OleUIEditLinksA
OleUIEditLinksW
OleUIAddVerbMenuA
OleUIBusyW
OleUIBusyA
GetSaveFileNameA
GetOpenFileNameA
ChooseColorW
ChooseFontW
ReplaceTextW
ChooseFontA
GetFileTitleA
GetFileTitleW
PrintDlgW
PageSetupDlgA
Ssync_ANSI_UNICODE_Struct_For_WOW
dwLBSubclass
PrintDlgExA
FindTextW
PageSetupDlgW
ReplaceTextA
FindTextA
LoadAlterBitmap
VerInstallFileA
VerFindFileW
GetFileVersionInfoSizeW
VerQueryValueW
VerQueryValueA
GetFileVersionInfoSizeA
VerFindFileA
GetFileVersionInfoW
CreateDispTypeInfo
VarR8Round
VarI4FromUI2
VarI1FromR8
OleIconToCursor
VarCat
VarR8Pow
VarDateFromUI2
VarDecFromDate
VarUI4FromDate
VarCmp
VarI4FromUI1
SafeArrayUnaccessData
VarDateFromI1
VarI4FromI8
CoCreateObjectInContext
OleConvertOLESTREAMToIStorage
CoTreatAsClass
OleInitialize
OleDuplicateData
GetRunningObjectTable
CoSetState
CoGetMarshalSizeMax
StgConvertVariantToProperty
CoRegisterInitializeSpy
OleCreateFromDataEx
CoCreateFreeThreadedMarshaler
CLSIDFromProgIDEx
CoSwitchCallContext
WriteClassStm
CoFreeLibrary
HGLOBAL_UserFree
HPALETTE_UserSize
OleLoadFromStream
CreateClassMoniker
CoCreateInstanceEx
IsValidIid
HMETAFILEPICT_UserSize
HGLOBAL_UserSize
StgOpenPropStg
LresultFromObject
AccessibleObjectFromPoint
AccessibleObjectFromEvent
GetOleaccVersionInfo
AccessibleChildren
GetStateTextW
CreateStdAccessibleObject
AccessibleObjectFromWindow
GetRoleTextA
DllUnregisterServer
WindowFromAccessibleObject
DllCanUnloadNow
GetStateTextA
IID_IAccessible
DeleteMonitorW
ConfigurePortW
AddPrinterConnectionW
AddPortW
AddPrinterDriverW
SetFormA
AddPrintProcessorA
StartDocPrinterW
EnumPrinterDriversA
GetFormA
SetJobW
ResetPrinterW
SetFormW
DeletePortA
GetPrinterW
StartPagePrinter
AddJobW
EnumPrintersW
EnumPrinterDataExA
DEVICEMODE
ConvertAnsiDevModeToUnicodeDevmode
SpoolerPrinterEvent
DeletePrinterIC
QueryRemoteFonts
RegisterTraceGuidsW
SetThreadToken
LsaLookupSids
LsaSetQuotasForAccount
LsaSetTrustedDomainInfoByName
LsaRemovePrivilegesFromAccount
LookupPrivilegeDisplayNameA
ElfChangeNotify
CredReadW
SetPrivateObjectSecurity
LsaGetSystemAccessAccount
GetCurrentHwProfileA
GetTraceEnableLevel
RegQueryMultipleValuesW
SetSecurityDescriptorControl
LsaQuerySecurityObject
RegEnumKeyExA
LsaGetUserName
LookupPrivilegeNameA
SystemFunction005
ElfReportEventW
FreeSid
WmiQueryGuidInformation
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ