Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
99c1acdecc67ed1b1c4633a33cbf5ba1_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
99c1acdecc67ed1b1c4633a33cbf5ba1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
99c1acdecc67ed1b1c4633a33cbf5ba1_JaffaCakes118
Size
374KB
MD5
99c1acdecc67ed1b1c4633a33cbf5ba1
SHA1
74f2ff4fba88ee228d7f65c2a33792858d69dca0
SHA256
10303b58f81724942406b4dc9983c5e1196e964b1b61f0c4d5f61f8ee4a7c4c8
SHA512
0b9d979663334ee0e4adc37de4d94b4591aa9565afd893ba961d1d83e8391220f5bcf1b0712e3866cc9aa3f2731e640b3c337c51526a7ae9956e5042e4fdb063
SSDEEP
6144:gjZyk9VdbPd++I51GN1Y8Quu/YiBm0ON3r/h6+s6ZeAt0o3FO1MSD:gjZyk9Vdzk+ID4Y8QuuAi5y3r/h6+BZ0
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetVersionExA
WaitForSingleObject
CreateProcessA
FindClose
FindFirstFileA
GetTempFileNameA
ReadFile
TerminateProcess
FlushFileBuffers
WriteConsoleW
SetEndOfFile
SetStdHandle
GetStringTypeW
GetConsoleMode
GetConsoleCP
SetFilePointer
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
GetFileType
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetPrivateProfileStringA
HeapCreate
GetModuleFileNameW
GetStdHandle
LoadLibraryW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
GetFileAttributesA
EncodePointer
VirtualQuery
GetSystemInfo
VirtualProtect
DecodePointer
ExitProcess
GetModuleHandleW
RtlUnwind
LocalFree
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
LoadLibraryA
IsDBCSLeadByte
GetProcAddress
lstrcmpiA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
GetModuleHandleA
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
MulDiv
lstrcmpA
GlobalAlloc
CloseHandle
GlobalLock
GlobalUnlock
lstrlenA
RaiseException
DeleteCriticalSection
MultiByteToWideChar
lstrlenW
GetModuleFileNameA
CreateFileA
WriteFile
Sleep
CreateDirectoryA
SetCurrentDirectoryA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
CreateMutexA
GetLastError
DeleteFileA
HeapSize
MessageBoxA
BeginPaint
DialogBoxParamA
UnregisterClassA
EndPaint
DefWindowProcA
EndDialog
IsDlgButtonChecked
GetDlgItemTextA
SetFocus
wsprintfA
EnableWindow
SetForegroundWindow
FindWindowA
RegisterClassA
LoadBitmapA
GetForegroundWindow
GetWindowRect
ShowWindow
CheckDlgButton
CheckRadioButton
SetDlgItemTextA
SetWindowPos
SetWindowTextA
SetClassLongA
GetWindowLongA
LoadIconA
CreateWindowExA
SendMessageA
GetCapture
SetTimer
GetCursorPos
PtInRect
KillTimer
SetCursor
CallWindowProcA
DestroyWindow
InvalidateRgn
InvalidateRect
SetCapture
ReleaseCapture
ScreenToClient
ClientToScreen
MoveWindow
CreateAcceleratorTableA
GetDC
ReleaseDC
GetDesktopWindow
CharNextA
GetParent
GetClassNameA
RedrawWindow
IsWindow
GetClientRect
FillRect
IsChild
GetFocus
GetWindow
GetSysColor
DestroyAcceleratorTable
GetWindowTextLengthA
GetWindowTextA
SetWindowLongA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
DrawIcon
PeekMessageA
TranslateMessage
DispatchMessageA
GetDlgItem
GetDeviceCaps
CreateSolidBrush
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetObjectA
GetStockObject
RegQueryValueExA
RegQueryInfoKeyW
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
ShellExecuteA
SHGetMalloc
SHBrowseForFolderA
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetPathFromIDListA
CLSIDFromString
CoCreateGuid
OleUninitialize
CoTaskMemFree
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CoTaskMemRealloc
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleInitialize
CoInitialize
CoUninitialize
SysStringByteLen
SysAllocStringByteLen
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
VarBstrCat
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocString
ImageList_Draw
ImageList_LoadImageA
ImageList_Destroy
InitCommonControlsEx
ord17
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetQueryDataAvailable
InternetReadFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ