Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
88cb79def618cc6322c359d97675da77_JaffaCakes118.exe
Resource
win7-20240221-en
Target
88cb79def618cc6322c359d97675da77_JaffaCakes118
Size
2.8MB
MD5
88cb79def618cc6322c359d97675da77
SHA1
16f438b67f1732e1c234e0ce7dfdfc79e696fc8a
SHA256
295648faa6ccc656b829734418217cf970d4b3896677c52012247a5e9ae1813d
SHA512
946be117a3d001c29cb3012bb35f78f62b3de442a9f5f014760b18215b96822a75bdc2f203d8e4f50ad25eea55018faf29fff1521213e5260f0bbd14ddda92d0
SSDEEP
49152:GTI0OHFEa7iwyYdPNvMNTa6QZE9iA6olsBXp9XfaB4zI+thNgYNPG9xjizvtZD:GTbueaewblMwZYiA6fCoVNe9xjizvXD
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
MoveFileA
DuplicateHandle
CreateProcessA
GetCurrentThreadId
GetFileSize
FindFirstFileW
FindResourceExW
LoadResource
InterlockedDecrement
GetCurrentProcess
WriteFile
GetUserDefaultLangID
OpenProcess
WideCharToMultiByte
Sleep
GetVersionExW
GetFileAttributesW
ReadFile
GetModuleFileNameW
CreateFileW
MultiByteToWideChar
lstrlenW
GetLastError
GetCurrentDirectoryW
GetLongPathNameW
GetProcAddress
FindClose
Process32FirstW
RemoveDirectoryW
QueryDosDeviceW
Module32FirstW
GetSystemInfo
Process32NextW
FindNextFileW
CreateToolhelp32Snapshot
Module32NextW
CloseHandle
SetFileAttributesW
CreateMutexW
WaitForSingleObject
ReleaseMutex
CreateThread
SetFilePointer
GetDriveTypeW
CreateDirectoryW
LoadLibraryW
FlushFileBuffers
CreateProcessW
CopyFileW
GetExitCodeProcess
DecodePointer
EncodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetSystemTimeAsFileTime
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteFileA
HeapFree
IsProcessorFeaturePresent
GetStdHandle
GetLocaleInfoW
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
FreeLibrary
LCMapStringW
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetStdHandle
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
LocalFree
GetModuleFileNameA
LoadLibraryA
FormatMessageA
FindResourceW
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetFullPathNameW
GetTimeFormatA
GetDateFormatA
GetFileAttributesA
CreateFileA
CreatePipe
SetEndOfFile
GetProcessHeap
DeleteFileW
GetSystemDirectoryW
GetModuleHandleW
HeapAlloc
GetEnvironmentVariableW
LoadIconW
CreateDialogParamW
ShowWindow
IsDialogMessageW
TranslateMessage
PostMessageW
GetMessageW
IsWindow
SetWindowTextW
DispatchMessageW
GetSystemMetrics
CallNextHookEx
GetDlgItem
SetWindowsHookExW
UnhookWindowsHookEx
MessageBoxW
SetDlgItemTextW
SendMessageW
DestroyWindow
SHGetFolderPathW
SHFileOperationW
SHCreateDirectoryExW
ShellExecuteW
ord165
SHDeleteKeyW
PathRemoveFileSpecW
ord113
RegEnumKeyExW
RegOpenKeyExW
FreeSid
AllocateAndInitializeSid
RegDeleteKeyW
RegEnumKeyW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegSetValueExW
CheckTokenMembership
CoInitializeEx
CoInitialize
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoCreateGuid
StringFromGUID2
CreateStreamOnHGlobal
SysFreeString
SysAllocString
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ