Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftKernelCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
8d3b24855e383ed6070c3da2c5a1bfe4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8d3b24855e383ed6070c3da2c5a1bfe4_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
8d3b24855e383ed6070c3da2c5a1bfe4_JaffaCakes118
Size
6.2MB
MD5
8d3b24855e383ed6070c3da2c5a1bfe4
SHA1
266b07df83b54e0bedfb37e36c0ad7e3087b82f7
SHA256
03cebd94d10cf77abafc8f8717a7d760a5ed19fe4740a06f0d4a17d476a7295c
SHA512
93ee83fb49a4a2e06e72e308a3a4ce65e1f8b4631d2bca32dcaafaba8fc2002a22f798729c662d591a3adfca55faf658f6c8e20c3f0e19d8bcd8dde6dd70a827
SSDEEP
196608:RE4e5q7Hc0zwexEzmAscUwG35uIqNVlq2CmAcH1OtKG:+pffexEzgQNLVlb1stp
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftKernelCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RemoveDirectoryW
lstrcmpiW
CopyFileW
CreateToolhelp32Snapshot
Process32FirstW
GetCurrentProcess
OpenProcess
SetLastError
TerminateProcess
Process32NextW
GetLastError
LocalFree
GetTempPathW
GetTempFileNameW
GetSystemDirectoryW
LocalAlloc
CreateDirectoryA
CreateFileA
WriteFile
WideCharToMultiByte
MultiByteToWideChar
FindClose
FindNextFileW
MoveFileExW
DeleteFileW
lstrlenA
SetEnvironmentVariableA
ReadConsoleW
ReadFile
SetEndOfFile
LCMapStringW
CompareStringW
FindFirstFileExW
OutputDebugStringW
GetStringTypeW
HeapReAlloc
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetTimeZoneInformation
HeapSize
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetStdHandle
GetStartupInfoW
TlsFree
CreateProcessW
CloseHandle
InterlockedDecrement
SizeofResource
LoadResource
FindResourceW
GetModuleHandleW
GetSystemTime
GetPrivateProfileStringW
lstrlenW
CreateFileW
WritePrivateProfileStringW
GetModuleFileNameW
GetExitCodeThread
WaitForSingleObject
GetVersionExW
GetTickCount
CreateDirectoryW
LoadLibraryW
FreeLibrary
Sleep
OpenMutexW
lstrcmpW
TlsSetValue
TlsGetValue
lstrcpyW
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetConsoleMode
lstrcatW
GetConsoleCP
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
IsProcessorFeaturePresent
IsDebuggerPresent
GetCommandLineW
GetSystemTimeAsFileTime
HeapAlloc
LoadLibraryExW
ExitThread
GetCurrentThreadId
CreateThread
EncodePointer
HeapFree
GlobalMemoryStatus
DecodePointer
GetProcAddress
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SendMessageW
wsprintfW
PostQuitMessage
MessageBoxW
TranslateMessage
GetDesktopWindow
DispatchMessageW
PeekMessageW
SetWindowTextW
GetObjectW
GetStockObject
CreateFontIndirectW
RegSetValueExW
RegEnumKeyExA
GetUserNameW
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegQueryValueExW
RegQueryValueExA
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
SHGetSpecialFolderPathW
SHGetFileInfoW
CoSetProxyBlanket
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoInitialize
InitCommonControlsEx
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
PathFileExistsA
PathFileExistsW
StrRChrIW
Direct3DCreate9
WSAStartup
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SysAllocString
VariantClear
SysFreeString
InternetCloseHandle
InternetReadFile
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetOpenW
InternetConnectW
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ