Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
85240aff7adaca2e088c7c3232bffeb9_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
85240aff7adaca2e088c7c3232bffeb9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
85240aff7adaca2e088c7c3232bffeb9_JaffaCakes118
Size
1.1MB
MD5
85240aff7adaca2e088c7c3232bffeb9
SHA1
d8f650da3281587c2d04ab48f2d69f3ce08eae46
SHA256
056f13467f7d27c25f47b1197b60843fa3b1279902f698b70ba9cecf6a018e8b
SHA512
9015abd5d24718d82d69f1e26b9bed0a95a75cea99a2b80464f4524d6052cfa355f51dce252508b83c1668d6ab5f600275adab69b5e1ada0d494034c45648299
SSDEEP
24576:DZVG5HRo0qBVLI96uCYOGfTJc3abtBSP7w69jF1+0sXUG3hz:vGJRABVz9YVVZBn6BF1M3hz
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\evil\SVN\Exe\projects\arcadeyum\bin\module.runner.pdb
ResetEvent
WaitForSingleObject
Sleep
LoadResource
SizeofResource
CloseHandle
GetTickCount
CreateMutexA
CreateEventA
FindResourceA
CreateDirectoryA
RemoveDirectoryA
DeleteFileA
FindFirstFileA
SetEvent
MoveFileExA
GetVersionExA
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
InitializeCriticalSectionAndSpinCount
lstrlenA
CreateFileW
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetStringTypeW
HeapReAlloc
SetLastError
GetLastError
GetCurrentProcess
OpenProcess
LockResource
FreeResource
GetComputerNameA
FindNextFileA
GetVolumeInformationA
LCMapStringW
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetProcessHeap
GetConsoleCP
WideCharToMultiByte
DeleteCriticalSection
GetFileType
SetEndOfFile
SetFilePointerEx
EncodePointer
DecodePointer
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
ReadFile
GetCommandLineA
GetStdHandle
WriteFile
GetModuleFileNameW
HeapAlloc
HeapFree
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
HeapSize
InterlockedIncrement
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetConsoleMode
ReadConsoleW
SetFilePointer
MessageBoxA
CreateWindowExA
DefWindowProcA
GetMessageA
PostQuitMessage
TranslateMessage
DispatchMessageA
RegisterClassExA
AllocateAndInitializeSid
EqualSid
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyA
RegCloseKey
FreeSid
ord680
ShellExecuteExA
SHGetFolderPathA
CoUninitialize
CoCreateInstance
CoInitialize
VariantInit
VariantClear
SysAllocString
ord176
PathFileExistsA
wnsprintfA
WinHttpReceiveResponse
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpOpenRequest
WinHttpSendRequest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ