Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
5bc4347b9bfda69e16f9eed249879f94_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5bc4347b9bfda69e16f9eed249879f94_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
5bc4347b9bfda69e16f9eed249879f94_JaffaCakes118
Size
1.4MB
MD5
5bc4347b9bfda69e16f9eed249879f94
SHA1
0f2bc06620985689a43d7cc2f13560812c85c81a
SHA256
dd2fc470206de0b81098f3483562823b40958416f567617dfb3e9aca5f7a3d50
SHA512
998790bb005c7799836421352e22adfa0ce0a569cf34dcb3526c84bc3d490c9c14e5d41ba9814db80b08dbb0ed5435ce77787bae5c0c5a55b83b37e100beaf45
SSDEEP
24576:uXlOD7i2Xj5XJdpIkQtaNVfFhKKXBAVE7x7f45Tjd+I2cpbgOS:wkQtmFhKuSVEd45T4N2S
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
GetInstallDetailsPayload
SignalChromeElf
SignalInitializeCrashReporting
ImpersonateNamedPipeClient
SetEntriesInAclW
GetSecurityInfo
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegDeleteValueW
RegSetValueExW
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
CreateProcessAsUserW
EventRegister
EventUnregister
EventWrite
SystemFunction036
RevertToSelf
RegDisablePredefinedCache
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
GetKernelObjectSecurity
GetAce
SetKernelObjectSecurity
DuplicateTokenEx
SetThreadToken
CreateRestrictedToken
DuplicateToken
EqualSid
LookupPrivilegeValueW
CopySid
CreateWellKnownSid
GetVersion
SleepEx
GetModuleFileNameW
CreateEventW
GetLastError
SetLastError
GetCurrentThreadId
GetCurrentProcess
DuplicateHandle
GetProcessId
WaitForSingleObject
SetCurrentDirectoryW
LoadLibraryExW
GetProcAddress
SetProcessShutdownParameters
VirtualAlloc
VirtualFree
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ReleaseSRWLockExclusive
GetCommandLineW
LocalFree
GetThreadId
GetModuleHandleA
IsDebuggerPresent
GetCurrentProcessId
OpenProcess
CloseHandle
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
GetCurrentThread
GetUserDefaultLangID
FindNextFileW
FindClose
FindFirstFileExW
GetFileAttributesW
GetModuleHandleW
VirtualQuery
VirtualProtect
GetModuleHandleExW
SetEnvironmentVariableW
GetEnvironmentVariableW
LoadLibraryW
GetLocaleInfoW
FreeLibrary
UnregisterWaitEx
RegisterWaitForSingleObject
ExpandEnvironmentStringsW
Sleep
GetTickCount
GetVersionExW
GetNativeSystemInfo
GetSystemDirectoryW
GetWindowsDirectoryW
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
IsWow64Process
RaiseException
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
GetSystemTimeAsFileTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
QueryPerformanceFrequency
QueryPerformanceCounter
QueryThreadCycleTime
GetThreadPriority
SetThreadPriority
FlushViewOfFile
TerminateProcess
GetExitCodeProcess
CreateProcessW
AssignProcessToJobObject
ResumeThread
SetHandleInformation
SetInformationJobObject
GetStdHandle
ReadFile
HeapSetInformation
GetProcessTimes
GetSystemInfo
VirtualQueryEx
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
SetEvent
ResetEvent
CreateNamedPipeW
CreateFileW
ConnectNamedPipe
WriteFile
PeekNamedPipe
SleepConditionVariableSRW
WakeAllConditionVariable
WakeConditionVariable
SetFileAttributesW
DeleteFileW
RemoveDirectoryW
MoveFileExW
MoveFileW
ReplaceFileW
CreateDirectoryW
CopyFileW
GetTempPathW
QueryDosDeviceW
GetCurrentDirectoryW
SetFilePointerEx
GetFileSizeEx
SetEndOfFile
GetFileInformationByHandle
FlushFileBuffers
GetLocalTime
FormatMessageA
OutputDebugStringA
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
TlsGetValue
CreateThread
TlsSetValue
TlsAlloc
TlsFree
InitializeCriticalSectionAndSpinCount
DecodePointer
CreateSemaphoreW
ReleaseSemaphore
InitOnceExecuteOnce
GetTimeZoneInformation
OutputDebugStringW
GetComputerNameExW
LockFileEx
UnlockFileEx
GetFileType
SetConsoleCtrlHandler
VirtualAllocEx
TerminateJobObject
GetUserDefaultLCID
ProcessIdToSessionId
WriteProcessMemory
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
VirtualProtectEx
ReadProcessMemory
VirtualFreeEx
CreateRemoteThread
CreateJobObjectW
CreateMutexW
SearchPathW
lstrlenW
DebugBreak
LoadLibraryExA
GetThreadTimes
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetACP
GetConsoleMode
GetConsoleCP
GetFullPathNameW
SetStdHandle
GetDriveTypeW
RtlUnwind
GetCPInfo
LCMapStringW
CompareStringW
EncodePointer
GetStringTypeW
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
GetLongPathNameW
DisconnectNamedPipe
WaitNamedPipeW
SetNamedPipeHandleState
TransactNamedPipe
SuspendThread
GetThreadContext
GetThreadLocale
GetSystemDefaultLCID
GetFileInformationByHandleEx
GetProcessMemoryInfo
GetPerformanceInfo
QueryWorkingSetEx
SHGetFolderPathW
SHGetKnownFolderPath
CommandLineToArgvW
PathMatchSpecW
SetProcessWindowStation
GetThreadDesktop
CreateWindowStationW
RegisterClassW
CloseWindowStation
CloseDesktop
wsprintfW
GetUserObjectInformationW
GetMessageW
GetProcessWindowStation
IsWindow
SendMessageTimeoutW
AllowSetForegroundWindow
TranslateMessage
PostQuitMessage
MsgWaitForMultipleObjectsEx
GetQueueStatus
SetTimer
PostMessageW
KillTimer
UnregisterClassW
SetProcessDPIAware
GetWindowThreadProcessId
DispatchMessageW
PeekMessageW
DefWindowProcW
SetWindowLongW
GetWindowLongW
FindWindowExW
CreateWindowExW
DestroyWindow
RegisterClassExW
CreateDesktopW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
timeBeginPeriod
timeGetTime
timeEndPeriod
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpWriteData
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpConnect
WinHttpOpen
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpReadData
WinHttpCrackUrl
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ