Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
6a5d22653b9f387dff7cba902bcf5d44_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6a5d22653b9f387dff7cba902bcf5d44_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
6a5d22653b9f387dff7cba902bcf5d44_JaffaCakes118
Size
9.8MB
MD5
6a5d22653b9f387dff7cba902bcf5d44
SHA1
c5fa45fd75720df49ed330b7e49030d9920d0465
SHA256
4eb7c1e7d95aa0f0b1baf2754ed3874b4a0fd752204782f8cd3596db26d3f3b4
SHA512
e6e7be10d1821865d36021a88e71698f46f03e0bb3fac9f6caeac0009814dd0f95de5224c169efef543f47bb8ee0fd26e849b55593efbf5b0dd36cc461c33ade
SSDEEP
196608:PFZZbij45Dsqc/Cesn69kRefCE5KrX8QfQfloOPw:P5x+qc/Cx69kRp1rX8Xflw
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftKernelCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\work\leyou\trunk\bin\Win32\Release\build\leyoubox\igame_01030923.pdb
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
InternetQueryOptionW
InternetSetOptionExW
InternetQueryDataAvailable
HttpAddRequestHeadersW
HttpQueryInfoW
HttpOpenRequestW
InternetCloseHandle
DeleteUrlCacheEntryW
GetUrlCacheEntryInfoW
InternetOpenW
InternetCrackUrlW
InternetReadFile
InternetConnectW
HttpSendRequestW
InternetOpenUrlW
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetGetLastResponseInfoW
InternetCanonicalizeUrlW
EnumProcesses
EnumProcessModules
GetModuleFileNameExW
GetModuleBaseNameW
GetFileAttributesA
HeapCreate
HeapValidate
FlushFileBuffers
GetTempPathW
HeapSize
LockFileEx
EnterCriticalSection
GetDiskFreeSpaceW
LoadLibraryA
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
GetFileAttributesExW
DeleteCriticalSection
GetCurrentThreadId
OutputDebugStringA
GetVersionExA
GetCurrentProcessId
GetTempPathA
LocalFree
GetSystemTime
AreFileApisANSI
DeleteFileA
SetFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
FileTimeToSystemTime
InterlockedIncrement
InterlockedDecrement
IsBadWritePtr
GetSystemDirectoryW
ResumeThread
SetEvent
CreateEventW
ExitThread
WaitForMultipleObjects
SetVolumeLabelW
MoveFileW
ReleaseSemaphore
CreateSemaphoreW
lstrcmpW
InterlockedExchange
CompareStringA
GetLocaleInfoW
lstrcmpA
EnumResourceLanguagesW
ConvertDefaultLocale
GetCurrentThread
GlobalDeleteAtom
SetLastError
GlobalAddAtomW
InitializeCriticalSection
LocalAlloc
MulDiv
GetThreadLocale
DuplicateHandle
GetVolumeInformationW
GetModuleHandleA
CompareStringW
GlobalFindAtomW
GlobalFlags
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetFileSizeEx
GetFileTime
SetErrorMode
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetConsoleCP
GetConsoleMode
GetFileType
SetStdHandle
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
VirtualQuery
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
VirtualFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LeaveCriticalSection
LCMapStringA
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetEnvironmentVariableA
GetCurrentDirectoryA
GetDriveTypeA
FormatMessageA
GetProcessHeap
UnlockFileEx
OutputDebugStringW
WaitForSingleObjectEx
LockFile
FlushViewOfFile
UnlockFile
InterlockedCompareExchange
HeapFree
QueryPerformanceCounter
SystemTimeToFileTime
HeapAlloc
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
TryEnterCriticalSection
SetFilePointer
HeapCompact
CreateMutexW
CreateFileA
HeapReAlloc
GetFullPathNameA
GetFullPathNameW
CreateThread
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
GetStdHandle
GetCurrentProcess
FindNextFileW
GetExitCodeProcess
FindClose
FindFirstFileW
CreatePipe
GetStartupInfoW
CreateProcessW
lstrcpyW
GetDiskFreeSpaceExW
GetShortPathNameW
RemoveDirectoryW
GetProcAddress
TerminateProcess
LoadLibraryW
OpenProcess
GetLogicalDriveStringsW
FreeLibrary
GetDriveTypeW
GlobalFree
GetLastError
CreateDirectoryA
GetModuleHandleW
WaitForSingleObject
SetEnvironmentVariableW
lstrlenA
UpdateResourceW
BeginUpdateResourceW
ReadFile
EndUpdateResourceW
GetFileSize
Sleep
WriteFile
CreateDirectoryW
DeleteFileW
WritePrivateProfileStringW
CreateFileW
CopyFileW
GetPrivateProfileStringW
FreeResource
CloseHandle
CreateToolhelp32Snapshot
Process32NextW
GetSystemInfo
LockResource
Process32FirstW
GlobalUnlock
lstrlenW
MultiByteToWideChar
GetModuleFileNameW
GetVersionExW
SizeofResource
WideCharToMultiByte
GlobalAlloc
GetTickCount
GlobalLock
LoadResource
FindResourceW
SetFileAttributesW
GetFileAttributesW
GetSystemTimeAsFileTime
HeapDestroy
LCMapStringW
FormatMessageW
FileTimeToLocalFileTime
RemovePropW
GetForegroundWindow
SetActiveWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
EndPaint
BeginPaint
GetWindowDC
GrayStringW
DrawTextExW
TabbedTextOutW
CharUpperW
GetWindowTextLengthW
GetWindowTextW
MoveWindow
GetDlgCtrlID
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
GetDlgItem
RegisterClipboardFormatW
GetMenuItemID
GetMenuItemCount
WinHelpW
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
ValidateRect
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetLastActivePopup
IsWindowEnabled
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
ModifyMenuW
GetMenuState
CheckMenuItem
IsRectEmpty
IntersectRect
SetRectEmpty
SetCursor
SetCapture
SetFocus
GetWindowLongW
SetWindowLongW
ReleaseCapture
CallWindowProcW
DefWindowProcW
IsWindow
UpdateLayeredWindow
DrawTextW
PtInRect
ReleaseDC
GetSubMenu
GetDesktopWindow
ClientToScreen
SetWindowRgn
SetTimer
ScreenToClient
PostMessageW
DestroyMenu
PostThreadMessageW
UnregisterClassW
MessageBeep
GetNextDlgGroupItem
KillTimer
LoadCursorW
InvalidateRgn
SetRect
CopyAcceleratorTableW
GetSysColorBrush
CharNextW
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
RegisterWindowMessageW
SendDlgItemMessageA
FindWindowW
LoadIconW
OffsetRect
GetCursorPos
ShowWindow
FindWindowExW
SendMessageW
CopyRect
GetWindowThreadProcessId
GetWindow
GetClientRect
LoadStringW
InvalidateRect
GetSysColor
EnableWindow
SendMessageTimeoutW
GetDC
MessageBoxW
wsprintfW
GetSystemMetrics
UpdateWindow
IsChild
GetCapture
GetClassLongW
GetClassNameW
SetPropW
UnhookWindowsHookEx
GetPropW
EnableMenuItem
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
CreateFontIndirectW
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
CreateRectRgnIndirect
GetClipBox
ExtSelectClipRgn
DeleteDC
CreateDIBSection
GetWindowExtEx
GetViewportExtEx
SelectObject
GetStockObject
CreateRoundRectRgn
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectW
CreateSolidBrush
DeleteObject
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
GetFileTitleW
DocumentPropertiesW
ClosePrinter
OpenPrinterW
RegQueryValueW
RegEnumKeyW
RegQueryValueExW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
InitializeSecurityDescriptor
RegOpenKeyW
RegCloseKey
RegOpenKeyExW
ShellExecuteExW
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetSpecialFolderPathW
SHBrowseForFolderW
ExtractIconW
_TrackMouseEvent
PathIsDirectoryW
PathFileExistsW
PathRemoveBackslashW
PathAppendW
StrCpyW
PathFindExtensionW
PathFindFileNameW
UrlUnescapeW
PathStripToRootW
PathIsUNCW
OleUIBusyW
CoRegisterMessageFilter
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoGetMalloc
CLSIDFromProgID
CLSIDFromString
CoTaskMemAlloc
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysFreeString
SysStringLen
OleCreateFontIndirect
VariantInit
VariantChangeType
SysAllocStringLen
VariantClear
SysAllocString
OleCreatePictureIndirect
URLDownloadToFileW
GdipGetImageWidth
GdipDrawImageRectRect
GdipDeleteBrush
GdipCloneBrush
GdipSetStringFormatLineAlign
GdipDeleteFont
GdipSetStringFormatAlign
GdipDeleteFontFamily
GdipCreateSolidFill
GdipCreateFont
GdipGetGenericFontFamilySansSerif
GdipDrawString
GdipCreateFontFamilyFromName
GdipCreateStringFormat
GdipDeleteStringFormat
GdipDeletePen
GdipSetImageAttributesColorMatrix
GdipSetTextRenderingHint
GdipSetImageAttributesWrapMode
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipSetSolidFillColor
GdipFillRectangleI
GdipCreatePen1
GdipDrawRectangleI
GdipGetPathWorldBounds
GdipGetFontStyle
GdipGetFamily
GdipAddPathString
GdipGetFontSize
GdipDeletePath
GdipCreatePath
GdipCreateFromHDC
GdipDeleteGraphics
GdipGetImageHeight
GdiplusStartup
GdipCloneImage
GdipDisposeImage
GdipAlloc
GdipFree
GdipLoadImageFromStream
GdiplusShutdown
GetAdaptersInfo
GetAdaptersAddresses
Netbios
SnmpUtilOidCpy
SnmpUtilVarBindFree
SnmpUtilOidNCmp
SetupIterateCabinetW
send
gethostbyname
closesocket
__WSAFDIsSet
socket
WSAStartup
htons
WSAGetLastError
select
connect
recv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ