Extended Key Usages
ExtKeyUsageMicrosoftServerGatedCrypto
ExtKeyUsageNetscapeServerGatedCrypto
Static task
static1
Behavioral task
behavioral1
Sample
81f15fc1837f300544fa63004b623f2b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
81f15fc1837f300544fa63004b623f2b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
81f15fc1837f300544fa63004b623f2b_JaffaCakes118
Size
12.3MB
MD5
81f15fc1837f300544fa63004b623f2b
SHA1
a0691692be8fc7b106cdf03698b8f82fbb3c54d6
SHA256
c835d42f5b5e80f7440472cd1baac2eb4af3d8b956179f8ce8415544d6ed7e68
SHA512
013adb4dc4074981883990d4a15864e01fbba0aef29382b10e47596bc311da09d7653ca39b056b461e134986c4f67eeb705d606e39e17f1fc4b6b1468d581369
SSDEEP
393216:MswBe8DcUIfer5Dl9PR84gYHtMHUMm3dcXsTo1CoU:MB/zrjqQWHo8sTo0P
ExtKeyUsageMicrosoftServerGatedCrypto
ExtKeyUsageNetscapeServerGatedCrypto
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RemoveDirectoryA
CreateDirectoryA
lstrcmpiA
CompareFileTime
FindNextFileA
GetShortPathNameA
DeviceIoControl
GetPrivateProfileStringA
GetTempFileNameA
GetModuleHandleA
DeleteFileA
CreateThread
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetSystemTimeAsFileTime
GetTempPathA
GetModuleFileNameA
GetSystemDirectoryA
FindClose
LoadLibraryA
GetProcAddress
ResumeThread
SuspendThread
TerminateThread
SetFileTime
Sleep
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
SetStdHandle
FlushFileBuffers
GetStringTypeW
GetStringTypeA
IsBadWritePtr
VirtualAlloc
InterlockedIncrement
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
lstrcatA
GetWindowsDirectoryA
EnterCriticalSection
GetDiskFreeSpaceA
MultiByteToWideChar
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
GetLastError
MulDiv
GetVersionExA
WideCharToMultiByte
LeaveCriticalSection
SetLastError
HeapFree
GetCurrentProcess
InterlockedDecrement
FindFirstFileA
GetDriveTypeA
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
WriteFile
FindResourceA
LoadResource
SizeofResource
LockResource
FreeResource
LoadLibraryExA
FreeLibrary
CreateFileA
ReadFile
CloseHandle
HeapReAlloc
GetLocalTime
GetFullPathNameA
lstrcpyA
HeapAlloc
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
HeapSize
TerminateProcess
GlobalReAlloc
LocalUnlock
GetCurrentDirectoryA
ExitProcess
GetStartupInfoA
RtlUnwind
lstrcmpA
GetSystemTime
SystemTimeToFileTime
LocalLock
GetTimeZoneInformation
LocalAlloc
GetTickCount
lstrcpynA
lstrlenA
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsSetValue
GlobalAlloc
TlsFree
IsBadReadPtr
TlsGetValue
SetFilePointer
GlobalLock
IsDBCSLeadByte
GetVolumeInformationA
GetCommandLineA
LocalFree
GetFileSize
InterlockedExchange
SetFileAttributesA
GetFileAttributesA
FileTimeToDosDateTime
FileTimeToLocalFileTime
IsBadStringPtrA
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileType
GetVersion
RaiseException
GetCurrentThreadId
QueryPerformanceCounter
GetStdHandle
GetCurrentProcessId
GlobalMemoryStatus
MsgWaitForMultipleObjects
PeekMessageA
CharLowerA
FindWindowA
LoadImageA
ReleaseDC
GetDC
GetSystemMetrics
LoadBitmapA
DestroyIcon
wsprintfA
EndPaint
GetSysColor
SystemParametersInfoA
DialogBoxParamA
EndDialog
GetDesktopWindow
CopyRect
OffsetRect
IsDlgButtonChecked
CheckDlgButton
EnableWindow
ShowWindow
GetDlgItemTextA
SetDlgItemTextA
SetWindowLongA
GetParent
GetWindowRect
SetWindowPos
SendMessageA
BeginPaint
CharNextA
UpdateWindow
MessageBoxA
ExitWindowsEx
SetCursor
TranslateMessage
DispatchMessageA
PostMessageA
CharUpperA
SendDlgItemMessageA
GetDlgItem
CharUpperBuffA
CharPrevA
SetWindowTextA
OemToCharA
GetWindowThreadProcessId
EnumWindows
LoadCursorA
GetActiveWindow
SetForegroundWindow
GetProcessWindowStation
GetUserObjectInformationW
WaitForInputIdle
IsWindow
GetClientRect
PatBlt
GetBkColor
CreateFontIndirectA
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
GetStockObject
StretchBlt
BitBlt
DeleteDC
SelectObject
DeleteObject
GetDeviceCaps
SetBkMode
SetTextColor
SetBkColor
CloseServiceHandle
RegisterEventSourceA
QueryServiceStatus
OpenSCManagerA
ReportEventA
DeregisterEventSource
RegCloseKey
RegCreateKeyExA
ControlService
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
RegQueryValueExA
RegDeleteValueA
RegEnumKeyExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegDeleteKeyA
RegCreateKeyA
RegOpenKeyExA
SHGetPathFromIDListA
SHChangeNotify
SHFileOperationA
SHBrowseForFolderA
CoUninitialize
CoCreateInstance
CoInitialize
CoCreateGuid
CoTaskMemFree
CoInitializeSecurity
StringFromGUID2
SysAllocString
VariantClear
SysFreeString
VariantInit
ord17
PropertySheetA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ord47
ord42
GetSaveFileNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ