Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
6312e50af74e027602835fbfbd0f36f1_JaffaCakes118.exe
Resource
win7-20240419-en
Target
6312e50af74e027602835fbfbd0f36f1_JaffaCakes118
Size
137KB
MD5
6312e50af74e027602835fbfbd0f36f1
SHA1
b49199cf00e9da82f3244fb534760d40e1d65404
SHA256
2c9b8ed7cb7ce9b49579453283292ddf478c6ab2953b66c27aac8dfc84c6fb2b
SHA512
e5bfc84a1edbdbdedad1552cf2b3d5bad1113ebd96f90b0e79e65e7a78af91a973f05c1998967c6e690a30b877375dd0f91d14c1caefb225cd51b23303874955
SSDEEP
3072:yF0Ecszb+wLvN0YBn/+kuSmR8+J2xixlwEHIOH5SZ:lJgmm+P3K+JpxFH5A
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleW
LoadLibraryA
GetProcAddress
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
GetThreadLocale
GetStartupInfoA
GetModuleFileNameW
GetLocaleInfoW
GetLastError
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
CreateThread
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileW
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
lstrcmpA
WaitForSingleObject
VirtualQueryEx
VirtualProtect
UnmapViewOfFile
TerminateThread
TerminateProcess
SystemTimeToFileTime
SuspendThread
SizeofResource
SignalObjectAndWait
SetUnhandledExceptionFilter
SetThreadPriority
SetLastError
SetFileAttributesA
SetFileAttributesW
SetEvent
ResumeThread
ResetEvent
RemoveDirectoryA
ReleaseMutex
ReadProcessMemory
QueryPerformanceFrequency
QueryPerformanceCounter
OpenProcess
OpenFileMappingA
OpenFileMappingW
MapViewOfFile
LockResource
LocalSize
LocalFree
LoadResource
LoadLibraryExA
LoadLibraryW
LeaveCriticalSection
IsValidLocale
IsBadReadPtr
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalMemoryStatus
GlobalHandle
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetVersionExW
GetTickCount
GetThreadPriority
GetThreadContext
GetTempPathA
GetSystemTime
GetSystemDirectoryW
GetSystemDefaultLangID
GetPriorityClass
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetFullPathNameW
GetFileTime
GetFileAttributesA
GetFileAttributesW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
GetCommandLineA
GetCPInfo
FreeResource
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
FormatMessageA
FormatMessageW
FindResourceA
FindResourceW
FindNextFileA
FindFirstFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsA
ExitThread
EnumCalendarInfoW
EnterCriticalSection
DuplicateHandle
DeleteFileA
DeleteFileW
DeleteCriticalSection
CreateRemoteThread
CreateProcessA
CreateProcessW
CreatePipe
CreateMutexA
CreateMutexW
CreateFileMappingA
CreateFileMappingW
CreateFileA
CreateEventW
CreateDirectoryA
CreateDirectoryW
CopyFileA
CompareStringW
Beep
GetProcessWindowStation
GetQueueStatus
LoadCursorFromFileW
PaintDesktop
CharUpperA
IsWindow
GetSysColorBrush
IsClipboardFormatAvailable
AnyPopup
CloseWindowStation
GetDesktopWindow
GetClipboardOwner
GetThreadDesktop
GetCaretBlinkTime
DestroyWindow
GetKeyState
IsIconic
GetTopWindow
GetSysColor
GetListBoxInfo
CharNextW
IsWindowVisible
CharToOemBuffA
CharNextExA
DeleteObject
UpdateColors
GetLayout
CreateMetaFileW
DeleteEnhMetaFile
GetTextAlign
GetDCPenColor
CloseMetaFile
CreateMetaFileA
FillPath
RealizePalette
EndDoc
SwapBuffers
GetFontLanguageInfo
GetSystemPaletteUse
RegOpenKeyA
RegQueryValueExA
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_controlfp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ