Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
6f0e67952f08e3369ed42363156014da_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6f0e67952f08e3369ed42363156014da_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
6f0e67952f08e3369ed42363156014da_JaffaCakes118
Size
1.8MB
MD5
6f0e67952f08e3369ed42363156014da
SHA1
107eb7b8cab67f0c3663388d5be6a79214564b82
SHA256
8e234d5dadf9e2b1cdfb2eb5d8693724ebd8edb2f426fcb9c9ec68fe4d0a10c0
SHA512
1d2670da4ecc2f685ae904b2d0dfaacfb68f0c7dccdac8dd9d578fb17b8ffc3527087b7052a3598f39a85037c52b91c430b8a645ad08ab9aa2bfb6e55bc9098d
SSDEEP
49152:SHY3RhzlpI06JeUrVTQCWnU/Kr2qI/kycvk:SHY3R1I06JxVT8U/dN/9f
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadResource
WideCharToMultiByte
SizeofResource
GetFileAttributesA
MultiByteToWideChar
LockResource
Process32First
OpenProcess
Process32Next
CreateToolhelp32Snapshot
LocalFree
SignalObjectAndWait
UnregisterWait
GetThreadPriority
GetTimeZoneInformation
RegisterWaitForSingleObject
FindResourceA
TerminateProcess
InterlockedDecrement
Sleep
ExitProcess
GetTempPathA
GetCurrentProcessId
GetVersionExA
CreateMutexA
GetTempFileNameA
GetVolumeInformationA
GetComputerNameA
DeleteFileA
CloseHandle
GetLocalTime
GetLastError
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
SetThreadPriority
CreateEventW
SetEvent
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
SwitchToThread
SetThreadAffinityMask
GetProcessAffinityMask
DeleteTimerQueueTimer
CreateDirectoryA
GetExitCodeProcess
GetTickCount
WaitForSingleObject
HeapFree
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapAlloc
GetCPInfo
ReadFile
GetConsoleMode
ReadConsoleW
SetFilePointer
WriteFile
GetConsoleCP
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetProcessHeap
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
SetFilePointerEx
FlushFileBuffers
HeapSize
SetLastError
InterlockedIncrement
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameW
RaiseException
IsValidCodePage
GetACP
GetOEMCP
GetStringTypeW
CreateFileW
GetModuleHandleW
SetStdHandle
WriteConsoleW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreW
RtlUnwind
HeapReAlloc
InterlockedExchange
FreeLibrary
LoadLibraryExW
OutputDebugStringW
LoadLibraryW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetEndOfFile
DuplicateHandle
GetExitCodeThread
lstrlenA
CreateTimerQueue
CreateTimerQueueTimer
ExitThread
CreateThread
SetEnvironmentVariableA
EnumWindows
IsWindow
GetWindowThreadProcessId
IsWindowVisible
GetClassNameA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
FreeSid
AllocateAndInitializeSid
RegQueryValueA
LookupAccountSidA
EqualSid
GetTokenInformation
ConvertSidToStringSidA
OpenProcessToken
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
ShellExecuteW
SHFileOperationA
SHGetFolderPathA
ShellExecuteExA
CoSetProxyBlanket
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
CoUninitialize
SysAllocString
VariantClear
VariantInit
SysFreeString
StrStrIA
PathFileExistsA
wnsprintfA
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetOpenUrlA
ord22
ord20
ord23
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ