Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
83db6efa1b9b335dd34cb71a46d5bc1a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
83db6efa1b9b335dd34cb71a46d5bc1a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
83db6efa1b9b335dd34cb71a46d5bc1a_JaffaCakes118
Size
571KB
MD5
83db6efa1b9b335dd34cb71a46d5bc1a
SHA1
4c751a3119573a4c9f90a601be264a449daa7712
SHA256
1179c3facd1ef9e3cd8b607a5ae5d0a68860ba6dd2b267950a660f3c883d0ece
SHA512
52b99ba33ed951f38cbe911ebd63523527ae65b3ad8dca5e4d2e44041e3afda5087007de887722cc09ca38df980b7f0834c7efe21800827e875a6e9aff01c4dc
SSDEEP
12288:w+SXACora0qwP6WutfTsbI7XHgZQKhJgeCmVuS:wJXACofqT9TssLHgZpJEEuS
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
t:\oneaddins\x86\ship\0\iecontentservice.pdb
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetUserNameExW
UuidCreate
GetCurrentThread
QueryPerformanceCounter
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
RaiseException
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
lstrlenW
GetLastError
GetProcAddress
GetModuleHandleW
lstrcmpiW
OpenFileMappingW
CreateFileMappingW
OpenProcess
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
GlobalFree
Sleep
GetCommandLineW
HeapFree
HeapAlloc
GetProcessHeap
GetModuleHandleA
VirtualAlloc
HeapSetInformation
HeapCreate
HeapDestroy
HeapReAlloc
HeapSize
HeapUnlock
HeapLock
TlsSetValue
SetLastError
GetFileAttributesW
GetVersion
LoadLibraryW
OutputDebugStringA
WideCharToMultiByte
LoadLibraryA
VirtualFree
TlsGetValue
InitializeCriticalSectionAndSpinCount
TlsAlloc
GetSystemDefaultLCID
TlsFree
GetVersionExA
GetModuleHandleExW
RtlCaptureStackBackTrace
WaitForSingleObject
ReleaseMutex
GetSystemTimeAsFileTime
GetTickCount
GetLocalTime
WriteFile
SetFileAttributesW
DeleteFileW
ReadFile
CreateFileW
ExpandEnvironmentStringsW
GetProcessTimes
GetCurrentProcess
CreateMutexA
OpenMutexA
CreateSemaphoreA
CreateFileMappingA
GetShortPathNameA
GetModuleFileNameA
GlobalAlloc
IsValidLocale
GetSystemDirectoryW
GetTimeZoneInformation
GetDiskFreeSpaceExW
IsWow64Process
GetUserDefaultLCID
GetSystemInfo
GetVersionExW
TerminateProcess
GetCurrentProcessId
GetCurrentThreadId
UnmapViewOfFile
MapViewOfFile
LocalFree
LocalAlloc
GetTempPathW
GetShortPathNameW
GetLongPathNameW
CreateDirectoryW
GetFileType
IsDBCSLeadByte
LockResource
FindResourceA
GetStringTypeExW
IsValidCodePage
CompareStringW
SetUnhandledExceptionFilter
GlobalMemoryStatus
ReleaseSemaphore
IsProcessorFeaturePresent
EncodePointer
DecodePointer
IsDebuggerPresent
VirtualProtect
_CxxThrowException
wcsncpy_s
__CxxFrameHandler3
_recalloc
memcpy
wcschr
bsearch
_vsnprintf_s
wcsncat_s
strncpy_s
memmove
wcsrchr
_CIsqrt
vswprintf_s
_vscwprintf
_vsnprintf
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_except_handler4_common
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_crt_debugger_hook
_invoke_watson
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
memset
malloc
memcpy_s
free
wcsstr
StrRetToBufW
PathStripPathW
UrlIsW
UrlUnescapeW
GdipGetImageEncodersSize
GdipCloneImage
GdipSaveImageToStream
GdipGetImageEncoders
GdipAlloc
GdipFree
GdipGetImageThumbnail
GdiplusShutdown
GdipDisposeImage
GdiplusStartup
GdipCreateBitmapFromHBITMAP
InternetCanonicalizeUrlW
_GetAllocCounters@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE