Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8598b0b8868ddc6089860b25b0949add_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8598b0b8868ddc6089860b25b0949add_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
8598b0b8868ddc6089860b25b0949add_JaffaCakes118
Size
610KB
MD5
8598b0b8868ddc6089860b25b0949add
SHA1
90ac242f3c8ad6d10fc5214abda211816a897b6f
SHA256
d67500339766f466e794c136b40ffe9a7ef3678b92d09b952dd9e4e50e7ee8b8
SHA512
72eb52c361e16b816e6e36a29fcfd5e3fbcee5e536cd7b07cdb8d21fdcbbff427687b53b2441cac16c19512471ac89d968b433eee30fff9bf3bbb81d2ef4360f
SSDEEP
12288:0VIPORVFw+KPPuPMFGpsFiosDlZAsLTUmYFDtCEXSec3FHSF6KXVemd8:aIPSZKjM6FxBSeISF6KXVVe
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\vmagent_new\bin\joblist\129758\out\Release\360Installer.pdb
SetLastError
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
SetFilePointer
ReadFile
InterlockedIncrement
InterlockedDecrement
lstrlenW
MultiByteToWideChar
LoadLibraryExW
lstrcmpiW
ReleaseMutex
OpenProcess
GetExitCodeProcess
DeleteFileW
GetModuleHandleA
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
lstrcmpW
QueryDosDeviceW
GetLogicalDriveStringsW
LoadLibraryA
WideCharToMultiByte
AreFileApisANSI
ProcessIdToSessionId
GetTickCount
Thread32Next
SuspendThread
OpenThread
Thread32First
ResumeThread
GetVersion
GetVersionExW
GlobalMemoryStatus
CreateDirectoryW
SystemTimeToFileTime
SetEnvironmentVariableW
FindClose
FindNextFileW
FindFirstFileW
CopyFileW
GetDriveTypeW
GetWindowsDirectoryW
Module32NextW
Module32FirstW
ExpandEnvironmentStringsW
GetLongPathNameW
GetTempPathW
GetDiskFreeSpaceExW
RemoveDirectoryW
InterlockedCompareExchange
InterlockedExchange
WriteFile
CreateFileA
GetSystemTimeAsFileTime
LocalFileTimeToFileTime
SetEndOfFile
SetFilePointerEx
GetFileSizeEx
OutputDebugStringW
FormatMessageW
GetLocalTime
GetSystemTime
CreateMutexW
TlsGetValue
HeapAlloc
HeapFree
GetProcessHeap
TlsSetValue
Sleep
AddAtomW
TlsAlloc
FindAtomW
DeleteAtom
TlsFree
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
CreateMutexA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
SetConsoleCtrlHandler
GetStartupInfoA
GetFileType
SetHandleCount
GetConsoleMode
GetConsoleCP
GetModuleFileNameA
GetStdHandle
FatalAppExitA
HeapCreate
GetCurrentThread
IsValidCodePage
GetOEMCP
GetACP
GetStringTypeW
LCMapStringW
LCMapStringA
GetCPInfo
GetStartupInfoW
WaitForSingleObject
CreateThread
FindResourceExW
LoadResource
LockResource
SizeofResource
CloseHandle
FindResourceW
RaiseException
GetCommandLineW
LocalFree
DeleteCriticalSection
InitializeCriticalSection
GetProcAddress
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
CreateProcessW
GetModuleHandleW
GetModuleFileNameW
GetCurrentProcessId
CreateFileW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
ExitProcess
ExitThread
RtlUnwind
lstrcmpA
GetThreadLocale
GetNativeSystemInfo
IsBadReadPtr
VirtualProtect
GetFileSize
GetVolumeInformationW
GlobalFree
GlobalAlloc
FlushFileBuffers
GetModuleHandleExW
lstrlenA
OpenMutexW
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapSize
HeapReAlloc
HeapDestroy
SetStdHandle
GetLastError
DeviceIoControl
GetAtomNameW
UnregisterClassA
wsprintfW
SendMessageTimeoutW
FindWindowW
DefWindowProcW
CreateDialogParamW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
DestroyWindow
ShowWindow
SetWindowLongW
CharNextW
GetWindowThreadProcessId
GetShellWindow
LoadImageW
GetSystemMetrics
PostQuitMessage
PostMessageW
SetWindowTextW
SendMessageW
SystemParametersInfoW
WindowFromPoint
SetForegroundWindow
WaitForInputIdle
CharLowerBuffW
GetActiveWindow
MessageBoxW
GetParent
GetWindow
GetWindowRect
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
IsDialogMessageW
RegSetValueExW
RegDeleteValueW
RegQueryValueExA
GetUserNameW
AllocateAndInitializeSid
IsValidSid
EqualSid
FreeSid
CreateProcessAsUserW
RevertToSelf
RegQueryValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
DuplicateTokenEx
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
CommandLineToArgvW
ord165
SHGetFolderPathW
SHChangeNotify
CoTaskMemFree
CoCreateGuid
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoInitialize
CoCreateInstance
SysFreeString
SysAllocStringLen
VarUI4FromStr
SysAllocString
StrCmpNIW
SHSetValueW
PathIsDirectoryW
PathRemoveExtensionW
PathFindFileNameW
SHGetValueA
StrTrimA
StrStrIW
SHDeleteKeyW
SHGetValueW
PathAppendW
PathAddBackslashW
PathCombineW
PathRemoveFileSpecW
PathFileExistsW
StrCmpIW
InitCommonControlsEx
WinVerifyTrust
WTHelperProvDataFromStateData
CertGetNameStringW
HttpSendRequestW
InternetReadFile
InternetCloseHandle
HttpQueryInfoW
InternetSetOptionW
InternetOpenW
InternetCrackUrlW
InternetSetFilePointer
InternetOpenUrlW
InternetConnectW
HttpOpenRequestW
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
EnumProcessModules
GetModuleFileNameExW
select
SetupIterateCabinetW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ