Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
51665e783b5eef08bdfa28906bf2b979_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
51665e783b5eef08bdfa28906bf2b979_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
51665e783b5eef08bdfa28906bf2b979_JaffaCakes118
Size
2.2MB
MD5
51665e783b5eef08bdfa28906bf2b979
SHA1
df32814fcbd79eed18ef989bcde6b06c83012ad1
SHA256
46cfb428dbd95ea4ce9302481073c326c764cc14d9266f73b4f7c228f6ef19aa
SHA512
7e8b0db893cb9ed6db7c1231076cb949ee9ab556331d91af4acc1e3b4a7491aed27a55e456ffbad41c2b2439f3beaa77b9d91d8ed72089629fb5d5932e62de47
SSDEEP
49152:98q5Oed8CEzaDRw6qRH9jLoKk7Awc5xQADwo:35uCMa6jRH9jLO8weS6wo
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D3D11CreateDeviceAndSwapChain
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
AddVectoredExceptionHandler
GetThreadContext
SetCurrentDirectoryW
GetModuleHandleW
AllocConsole
ReadFile
GetLogicalDrives
FindNextFileW
WriteFile
SetFilePointer
FindClose
CreateFileW
SetFileAttributesW
LoadLibraryW
LocalFree
GetTickCount
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetFileSizeEx
GetConsoleCP
FlushFileBuffers
Sleep
GetUserDefaultLCID
IsValidLocale
HeapFree
HeapAlloc
GetFileType
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetCommandLineW
GetCommandLineA
CreateThread
ExitProcess
GetModuleFileNameW
GetStdHandle
LoadLibraryExW
FreeLibrary
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetCPInfo
GetStringTypeW
CloseHandle
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
GetFileAttributesW
GetTempPathW
TerminateProcess
GetCurrentProcess
QueryPerformanceCounter
GetProcAddress
QueryPerformanceFrequency
GlobalUnlock
WideCharToMultiByte
GlobalLock
GlobalFree
GlobalAlloc
RtlUnwind
MultiByteToWideChar
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetProcessHeap
HeapReAlloc
HeapSize
WriteConsoleW
GetLocaleInfoW
LCMapStringW
CompareStringW
DeleteFileW
Process32NextW
GetModuleHandleExW
GetLastError
SetEndOfFile
EnumSystemLocalesW
DecodePointer
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
SetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetClipboardData
SetClipboardData
EmptyClipboard
wsprintfW
DefWindowProcW
GetWindowRect
SetWindowPos
CreateWindowExW
UnregisterClassW
RegisterClassExW
ShowWindow
DispatchMessageW
PeekMessageW
MessageBoxA
TranslateMessage
PostQuitMessage
GetDesktopWindow
UpdateWindow
GetKeyState
ScreenToClient
GetCapture
ClientToScreen
IsChild
GetForegroundWindow
LoadCursorW
SetCapture
SetCursor
GetClientRect
ReleaseCapture
SetCursorPos
GetCursorPos
OpenClipboard
CloseClipboard
RegCreateKeyW
QueryServiceStatusEx
RegDeleteValueA
RegCloseKey
AllocateAndInitializeSid
SetEntriesInAclW
RegCreateKeyExW
SetNamedSecurityInfoW
RegEnumKeyExW
RegSetValueExW
FreeSid
RegCopyTreeW
RegOpenKeyExW
RegQueryValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
CreateServiceW
CloseServiceHandle
OpenSCManagerW
OpenSCManagerA
DeleteService
ControlService
StartServiceA
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
OpenServiceW
OpenServiceA
SHFileOperationW
SHGetFolderPathW
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
D3DCompile
ord4
ord2
SHDeleteValueW
PathFileExistsW
SHDeleteKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE