Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
7028f7db0794e5828c35378df491d1bc_JaffaCakes118.exe
Resource
win7-20240508-en
Target
7028f7db0794e5828c35378df491d1bc_JaffaCakes118
Size
765KB
MD5
7028f7db0794e5828c35378df491d1bc
SHA1
99d1c2e675397fce8c3fa0cda362c6cf9761fe58
SHA256
8655fb0ba3e61b2285ec50145cb5f863c6af92482a6c939d63d62b9b1112c921
SHA512
e171cfba22a60cd60fa306e2713b151551d432c2f8232850e4547a3787b186b06394d84d061f57c860043123515608cad0f54ae684b82de02d28d3275bf75adb
SSDEEP
12288:JiQ1YJyv/Kd2DhqYGvgt5cJenPuRTpeh/I0FcLJT9ekZPNm2nxUuY:JiMi2DhV5Zun8ctT9eaPfxUuY
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FreeContextBuffer
QuerySecurityPackageInfoW
AcquireCredentialsHandleW
FreeCredentialsHandle
InitializeSecurityContextW
GetUserNameExW
GetUserNameExA
CompleteAuthToken
SCardEstablishContext
SCardReleaseContext
SCardGetStatusChangeW
SCardListReadersW
send
WSAStartup
__WSAFDIsSet
WSAIoctl
closesocket
select
getaddrinfo
WSACleanup
socket
connect
htons
freeaddrinfo
setsockopt
inet_addr
recv
ioctlsocket
WSAGetLastError
DestroyEnvironmentBlock
CreateEnvironmentBlock
MiniDumpWriteDump
WTSEnumerateSessionsW
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoUninitialize
EnumSystemLocalesA
MultiByteToWideChar
Sleep
GetConsoleMode
GetTimeZoneInformation
CompareStringA
GetLastError
OpenMutexA
FatalAppExitA
CreateFileA
GetUserDefaultLCID
SetEvent
GetCurrentThread
TerminateThread
lstrcatW
TlsAlloc
LockResource
GlobalAlloc
CloseHandle
RaiseException
ResetEvent
LoadResource
HeapAlloc
FileTimeToLocalFileTime
QueueUserAPC
GetOverlappedResult
SearchPathA
HeapDestroy
LocalSize
GetProcAddress
GlobalLock
GetTimeFormatW
GetStartupInfoA
IsProcessorFeaturePresent
DeleteCriticalSection
ExitProcess
lstrcpynA
GetCurrentProcessId
UnhandledExceptionFilter
SystemTimeToFileTime
GetModuleHandleW
WideCharToMultiByte
lstrcpyW
TlsGetValue
ConvertFiberToThread
GetSystemTime
GlobalMemoryStatus
FormatMessageA
CreateFileMappingW
CreateEventA
MapViewOfFile
GetStringTypeW
GetTickCount
GetEnvironmentStringsW
lstrcmpW
GetStringTypeA
IsDebuggerPresent
HeapSize
WriteFile
WaitForSingleObject
GetCurrentThreadId
GetSystemDirectoryW
OpenProcess
LoadLibraryW
CreateThread
FreeLibrary
WaitNamedPipeW
GetExitCodeProcess
GetVersionExW
LocalFree
lstrcmpiW
SizeofResource
FindResourceW
LoadLibraryExW
SetHandleInformation
GetCommandLineW
ExpandEnvironmentStringsW
CreatePipe
PeekNamedPipe
GetEnvironmentVariableA
GetTimeFormatA
FreeResource
GetDateFormatA
MoveFileExW
CreateEventW
lstrcmpA
LoadLibraryA
lstrcmpiA
InterlockedIncrement
GlobalUnlock
CreateDirectoryW
GetFileSizeEx
DeleteFileW
MoveFileW
GetDriveTypeW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
SetFileTime
ProcessIdToSessionId
SleepEx
GetFileTime
GetLogicalDrives
FindNextFileW
RemoveDirectoryW
SetFileAttributesW
OpenEventW
QueryPerformanceFrequency
QueryPerformanceCounter
lstrlenA
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetFileSize
SetUnhandledExceptionFilter
LocalAlloc
FileTimeToSystemTime
GetSystemInfo
GetComputerNameW
GetComputerNameA
GetModuleFileNameA
GetSystemTimeAsFileTime
SetThreadPriority
ResumeThread
DuplicateHandle
CreateSemaphoreW
GetACP
ExitThread
UnmapViewOfFile
CreateFileW
GetLocaleInfoW
FindClose
CreateMutexW
SetEndOfFile
WriteFileEx
GetFullPathNameA
SetFilePointer
InitializeCriticalSection
GetUserDefaultUILanguage
GetProcessId
GetThreadLocale
GetConsoleCP
WaitForMultipleObjects
GetModuleFileNameW
TerminateProcess
InterlockedDecrement
VirtualAlloc
WriteConsoleA
GetStdHandle
lstrlenW
GetCurrentProcess
TlsSetValue
CompareStringW
EraseTape
FindFirstFileW
LocalLock
ReadFile
IsValidCodePage
CreateProcessW
GetVersion
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
TlsFree
LCMapStringW
GetCPInfo
WaitForSingleObjectEx
GetStartupInfoW
InitializeSListHead
RtlUnwind
GetFileType
GetModuleHandleExW
FreeLibraryAndExitThread
HeapReAlloc
HeapFree
FlushFileBuffers
IsValidLocale
EnumSystemLocalesW
SetFilePointerEx
ReadConsoleW
SetStdHandle
GetProcessHeap
FindFirstFileExA
FindNextFileA
GetOEMCP
GetCommandLineA
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetLastError
WriteConsoleW
ReleaseDC
GetDC
IntersectRect
EnumWindows
IsWindowVisible
ExitWindowsEx
mouse_event
MessageBoxA
CreateWindowExW
GetMessageW
PostThreadMessageW
CreateDialogParamW
DefWindowProcW
CallWindowProcW
CheckMenuRadioItem
GetFocus
LoadCursorA
DestroyWindow
SetWindowPos
CheckRadioButton
HideCaret
PostMessageA
ScreenToClient
DialogBoxParamA
MsgWaitForMultipleObjects
RegisterClassExW
GetWindowPlacement
LoadAcceleratorsW
LoadStringW
GetSubMenu
ShowWindow
OffsetRect
TranslateAcceleratorA
DispatchMessageW
SetTimer
IsDialogMessageW
GetMenuCheckMarkDimensions
DrawTextA
SendMessageW
GetDlgCtrlID
GetThreadDesktop
CloseDesktop
ClientToScreen
CloseClipboard
CallWindowProcA
PostMessageW
PeekMessageW
GetWindowTextA
IsChild
SetDlgItemTextW
GetKeyboardLayout
AttachThreadInput
GetDlgItemTextW
SendDlgItemMessageW
GetForegroundWindow
GetDialogBaseUnits
SetMenu
RegisterClassA
WinHelpW
DefWindowProcA
DestroyMenu
CreateWindowExA
LoadCursorW
SetDlgItemTextA
SetCapture
wsprintfW
CreateDialogParamA
SetWindowLongW
TrackPopupMenuEx
IsZoomed
KillTimer
PostQuitMessage
SetWinEventHook
FindWindowA
InsertMenuItemA
RegisterClassExA
UpdateWindow
UnhookWinEvent
ReleaseCapture
SetForegroundWindow
IsIconic
BeginPaint
EndPaint
OpenClipboard
GetCursorInfo
ChangeClipboardChain
OpenInputDesktop
GetClipboardData
SetClipboardData
GetUserObjectInformationW
GetDesktopWindow
GetCursorPos
VkKeyScanExW
MapVirtualKeyW
GetAsyncKeyState
FindWindowW
OpenDesktopW
GetWindowLongW
GetWindowRect
EqualRect
SetClipboardViewer
GetClipboardOwner
EmptyClipboard
GetIconInfo
LoadKeyboardLayoutW
SendMessageTimeoutW
SystemParametersInfoW
keybd_event
GetSystemMetrics
SetThreadDesktop
SetWindowLongA
GetKeyboardState
BitBlt
CreateDIBSection
CreateCompatibleDC
GdiFlush
RealizePalette
GetDIBits
GetSystemPaletteEntries
DeleteDC
SelectPalette
CreatePalette
CreateRectRgnIndirect
GetRegionData
CombineRgn
GetBitmapBits
GetObjectW
CreateCompatibleBitmap
SelectObject
StartPage
StretchBlt
StartDocA
EndDoc
CreateDCW
SetWindowExtEx
SetViewportExtEx
GetDeviceCaps
GetTextMetricsW
TextOutW
SetBkMode
SetBkColor
LPtoDP
DeleteObject
SetMapMode
GetObjectA
StartDocW
GetPrinterDriverW
ChooseColorA
PageSetupDlgW
PrintDlgExW
GetSaveFileNameW
GetSaveFileNameA
ChooseFontW
FindTextW
GetOpenFileNameW
InitiateSystemShutdownExW
CreateServiceW
CloseServiceHandle
OpenSCManagerW
StartServiceW
EnumServicesStatusExW
QueryServiceConfigW
OpenServiceW
AccessCheck
SetSecurityDescriptorOwner
AllocateAndInitializeSid
ConvertSidToStringSidW
GetSidSubAuthority
IsValidSecurityDescriptor
FreeSid
InitializeAcl
DuplicateToken
GetLengthSid
GetTokenInformation
SetSecurityDescriptorDacl
RegisterServiceCtrlHandlerExW
AddAccessAllowedAce
SetTokenInformation
OpenThreadToken
SetSecurityDescriptorGroup
SetServiceStatus
CreateProcessAsUserW
StartServiceCtrlDispatcherW
DuplicateTokenEx
RegCloseKey
RegQueryValueExA
RegOpenKeyExW
RegCreateKeyA
RegOpenKeyA
QueryServiceStatus
OpenSCManagerA
DeleteService
ControlService
RegSetValueExA
OpenProcessToken
InitializeSecurityDescriptor
RegDeleteValueA
GetUserNameW
AdjustTokenPrivileges
LookupPrivilegeValueW
ImpersonateLoggedOnUser
RevertToSelf
RegDeleteValueW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegOpenKeyExA
RegCreateKeyExA
OpenServiceA
RegDeleteKeyA
RegQueryValueExW
Shell_NotifyIconA
SHGetSpecialFolderPathW
ShellAboutW
ShellExecuteW
DragQueryFileW
SysAllocString
SysFreeString
VariantInit
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ