Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftKernelCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
642770fd23381886bcabdc003c7d7af9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
642770fd23381886bcabdc003c7d7af9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
642770fd23381886bcabdc003c7d7af9_JaffaCakes118
Size
6.2MB
MD5
642770fd23381886bcabdc003c7d7af9
SHA1
c99fc9a98d3624f3cdc998c13109c6e19b96cb5b
SHA256
0c62f3e0ce2657a6adbae9be440dc21d31016d3294113547ac50097c888a7f7a
SHA512
345a84dc8930404615ad398502445ac89329a0f91b1c2674e48a3d6d72bc20f68d8a1bea4a6540161b3f5bc640c427e3e5e602e08236b5af1fc2cf9dc70aaf40
SSDEEP
196608:Qy4e5yIakIvj1D+tmhZuIqNVlq2CmAcH1Ot1:lpyYW+tmSLVlb1st1
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftKernelCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RemoveDirectoryW
lstrcmpiW
CopyFileW
CreateToolhelp32Snapshot
Process32FirstW
GetCurrentProcess
OpenProcess
SetLastError
TerminateProcess
Process32NextW
GetLastError
LocalFree
GetTempPathW
GetTempFileNameW
GetSystemDirectoryW
LocalAlloc
CreateDirectoryA
CreateFileA
WriteFile
WideCharToMultiByte
MultiByteToWideChar
FindClose
FindNextFileW
MoveFileExW
DeleteFileW
lstrlenA
SetEnvironmentVariableA
ReadConsoleW
ReadFile
SetEndOfFile
LCMapStringW
CompareStringW
FindFirstFileExW
OutputDebugStringW
GetStringTypeW
HeapReAlloc
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetTimeZoneInformation
HeapSize
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetStdHandle
GetStartupInfoW
TlsFree
CreateProcessW
CloseHandle
InterlockedDecrement
SizeofResource
LoadResource
FindResourceW
GetModuleHandleW
GetSystemTime
GetPrivateProfileStringW
lstrlenW
CreateFileW
WritePrivateProfileStringW
GetModuleFileNameW
GetExitCodeThread
WaitForSingleObject
GetVersionExW
GetTickCount
CreateDirectoryW
LoadLibraryW
FreeLibrary
Sleep
OpenMutexW
lstrcmpW
TlsSetValue
TlsGetValue
lstrcpyW
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetConsoleMode
lstrcatW
GetConsoleCP
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
IsProcessorFeaturePresent
IsDebuggerPresent
GetCommandLineW
GetSystemTimeAsFileTime
HeapAlloc
LoadLibraryExW
ExitThread
GetCurrentThreadId
CreateThread
EncodePointer
HeapFree
GlobalMemoryStatus
DecodePointer
GetProcAddress
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SendMessageW
wsprintfW
PostQuitMessage
MessageBoxW
TranslateMessage
GetDesktopWindow
DispatchMessageW
PeekMessageW
SetWindowTextW
GetObjectW
GetStockObject
CreateFontIndirectW
RegSetValueExW
RegEnumKeyExA
GetUserNameW
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegQueryValueExW
RegQueryValueExA
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
SHGetSpecialFolderPathW
SHGetFileInfoW
CoSetProxyBlanket
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoInitialize
InitCommonControlsEx
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
PathFileExistsA
PathFileExistsW
StrRChrIW
Direct3DCreate9
WSAStartup
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SysAllocString
VariantClear
SysFreeString
InternetCloseHandle
InternetReadFile
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetOpenW
InternetConnectW
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ