Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
69904efa970966a8e64c1587cf7b4f1b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69904efa970966a8e64c1587cf7b4f1b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
69904efa970966a8e64c1587cf7b4f1b_JaffaCakes118
Size
1.1MB
MD5
69904efa970966a8e64c1587cf7b4f1b
SHA1
5ee89083db8a4d3812b2d939659e24b6b12ed507
SHA256
da4231226b971994031087a5f9624033c2d1a346cdc054579952789283505c76
SHA512
66bbfd2cb4474a306a8f57a71402e6b6537606a89f01dca1fe2580a616ef94c3b8a3fdeb43343c5746504f347955f3f89122b3c67160347c669ad2359c3e4394
SSDEEP
24576:cbJbIGB3LHQTrk6ZcHz6GX6JZJObz6yqKVvv/INbE6vDExCb8f:cdIGB30TrLZcjX6JZJqzbrvz6EUk
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateSemaphoreW
CreateThread
CreateToolhelp32Snapshot
CreateWaitableTimerA
DecodePointer
DeleteCriticalSection
DeleteFileA
DeleteFileW
DeviceIoControl
DosDateTimeToFileTime
DuplicateHandle
EncodePointer
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlushConsoleInputBuffer
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetAtomNameA
GetCommandLineW
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetEnvironmentStringsW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
GetFileSizeEx
GetFileTime
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocalTime
GetLogicalDrives
GetLongPathNameW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
GetPrivateProfileSectionW
GetPrivateProfileStringA
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetProcessId
GetQueuedCompletionStatus
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathA
GetTempPathW
GetThreadPriority
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetVersion
GetVersionExA
GetVersionExW
GetVolumeInformationW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
HeapValidate
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
InterlockedPopEntrySList
InterlockedPushEntrySList
CreateSemaphoreA
IsProcessorFeaturePresent
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFree
LockFile
LockFileEx
LockResource
MapViewOfFile
MoveFileExW
MoveFileW
MulDiv
MultiByteToWideChar
OpenEventA
OpenFileMappingW
OpenMutexW
OpenProcess
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
Process32FirstW
Process32NextW
QueryPerformanceCounter
QueueUserAPC
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
SearchPathW
SetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableW
SetEvent
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetFileTime
SetLastError
SetThreadExecutionState
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
SizeofResource
Sleep
SleepEx
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnlockFile
UnlockFileEx
UnmapViewOfFile
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileSectionW
WriteProcessMemory
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
SetErrorMode
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
RtlUnwind
IsValidCodePage
GetOEMCP
GetCPInfo
SetHandleCount
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetCommandLineA
CreateProcessW
CreateMutexW
CreateMutexA
CreateIoCompletionPort
CreateHardLinkA
CreateFileW
CreateFileMappingW
CreateFileMappingA
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryW
CopyFileW
CompareStringW
CompareFileTime
CloseHandle
AreFileApisANSI
IsDebuggerPresent
AddVectoredExceptionHandler
AnyPopup
InSendMessage
GetOpenClipboardWindow
GetParent
GetWindowContextHelpId
GetMenuContextHelpId
GetMessageExtraInfo
IsIconic
GetSysColorBrush
LoadIconA
DestroyMenu
LoadCursorFromFileW
GetCaretBlinkTime
IsCharLowerW
IsWindowUnicode
GetKeyboardType
VkKeyScanA
GetKeyboardLayout
keybd_event
UnregisterHotKey
UnhookWindowsHookEx
SetWindowsHookExW
SetForegroundWindow
RegisterWindowMessageW
RegisterHotKey
PostMessageW
GetWindowThreadProcessId
GetLastActivePopup
GetKeyState
GetForegroundWindow
GetAsyncKeyState
DestroyIcon
CallNextHookEx
AttachThreadInput
PathToRegion
DeleteObject
GetDCBrushColor
GetBkColor
GetStockObject
UpdateColors
GetTextCharset
GetGraphicsMode
GetTextAlign
CloseFigure
CreateMetaFileW
EndDoc
CreateSolidBrush
UnrealizeObject
RegOpenKeyExA
OpenProcessToken
RegQueryValueExW
ExtractIconExW
SHGetFileInfoW
SHGetFolderPathW
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ