Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
9bb69ea212887792db4d240a08841340_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9bb69ea212887792db4d240a08841340_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
9bb69ea212887792db4d240a08841340_JaffaCakes118
Size
3.5MB
MD5
9bb69ea212887792db4d240a08841340
SHA1
5c2da489af7d355ca6777e4b23f2e16faca06011
SHA256
85c810c6a2b58164d8d6e1580af2c9774402fc2ca85f4af3a750b82d4980865c
SHA512
6ebe653de084573b604c5823926d1fe1d641eb4982238a3f040b6781b76b805e214fb5fbff30dd276b6e88fea06df8a70f6a9a048c622857d1ba5819ec41ebce
SSDEEP
49152:4bJ7nLf/U2wfVgsWifgyy0u4Z3cplx8WQjQPf18G1KWLGD4O8b8ITDnld+z0h:4bJbLHUVVMifgy8qWQjif1/KWS
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
D:\DCB\CBT_Main\BuildResults\bin\Release\AcrobatExe.pdb
TerminateThread
GetModuleFileNameA
GetSystemPowerStatus
CreateFileA
FindFirstFileA
FindNextFileA
GetFileAttributesA
GetFinalPathNameByHandleW
SetFilePointer
GetSystemInfo
VirtualQueryEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
LoadLibraryExA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
WideCharToMultiByte
SetErrorMode
QueryPerformanceCounter
HeapSetInformation
ReleaseSemaphore
WaitForMultipleObjects
CreateSemaphoreW
CreateProcessW
GetSystemTime
GetSystemTimeAsFileTime
AddAtomW
SystemTimeToFileTime
IsProcessorFeaturePresent
GetVersionExW
GetCurrentThread
CreateEventA
lstrcmpW
lstrcmpA
GetSystemDirectoryW
OutputDebugStringW
QueryDosDeviceW
GetFileAttributesW
FindFirstFileW
FindClose
GetCurrentDirectoryW
MultiByteToWideChar
SetDllDirectoryW
LoadLibraryA
LoadLibraryExW
FreeLibrary
GetExitCodeProcess
GetLongPathNameW
SetCurrentDirectoryW
GetCommandLineW
GetTickCount
OpenMutexW
GetVolumeInformationW
CreateThread
CreateEventW
CreateMutexW
WaitForSingleObject
ResetEvent
SetEvent
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WaitNamedPipeW
CreateNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
DisconnectNamedPipe
ConnectNamedPipe
WriteFile
ReadFile
GetFileType
CreateFileW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LoadLibraryW
FindResourceW
SizeofResource
SetEndOfFile
WriteConsoleW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
ReadConsoleW
SetStdHandle
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetStdHandle
ExitProcess
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileAttributesExW
GetFullPathNameW
GetConsoleMode
GetConsoleCP
RtlUnwind
QueryDepthSList
InterlockedFlushSList
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
LockResource
LoadResource
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
FindResourceExW
OpenProcess
TerminateProcess
Sleep
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetLastError
RaiseException
DecodePointer
OutputDebugStringA
GetStartupInfoW
lstrlenW
GetCurrentProcessId
GetCurrentProcess
GetTempPathW
CreateDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
VerifyVersionInfoW
lstrcmpiW
LocalFree
LocalAlloc
GetCurrentThreadId
GetLastError
CloseHandle
VerSetConditionMask
GetProcAddress
SetThreadPriority
GetThreadPriority
CreateTimerQueue
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
CompareStringW
GetCPInfo
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStringTypeW
SwitchToThread
WaitForSingleObjectEx
GetFileSizeEx
GetModuleHandleExW
QueryFullProcessImageNameW
MulDiv
VirtualProtect
VirtualQuery
DeleteFileW
ReleaseMutex
FormatMessageA
ExpandEnvironmentStringsW
ProcessIdToSessionId
DuplicateHandle
ResumeThread
GetProcessId
AssignProcessToJobObject
SetInformationJobObject
GetNativeSystemInfo
GetCPInfoExW
InitializeCriticalSectionAndSpinCount
TryEnterCriticalSection
GetLocaleInfoW
GetEnvironmentVariableW
FlushFileBuffers
GetDriveTypeW
GetFileInformationByHandle
GetFileSize
GetVolumeInformationByHandleW
GetVolumeNameForVolumeMountPointW
GetVolumePathNamesForVolumeNameW
DeviceIoControl
VirtualProtectEx
WriteProcessMemory
GetProfileStringW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
TerminateJobObject
VirtualAllocEx
DebugBreak
CreateJobObjectW
UnregisterWaitEx
RegisterWaitForSingleObject
GetThreadContext
VirtualFree
SignalObjectAndWait
VirtualFreeEx
SearchPathW
QueryInformationJobObject
ReadProcessMemory
ExitThread
GetModuleHandleExA
GetTempFileNameW
GlobalAlloc
GlobalFree
GetProcessTimes
GetExitCodeThread
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
CopyFileW
MoveFileExW
SetEnvironmentVariableW
CreateDirectoryExW
IsProcessInJob
GetComputerNameExW
OpenEventW
OpenFileMappingW
GlobalSize
GlobalUnlock
GlobalLock
FindNextFileW
FileTimeToSystemTime
GlobalHandle
DdeDisconnect
DdeConnect
DdeAddData
DdeCreateDataHandle
DdeQueryStringA
DdeGetData
EnumThreadWindows
IsWindowVisible
DdeFreeStringHandle
DdeCreateStringHandleW
DdeNameService
DdeUninitialize
DdeInitializeW
SetWindowLongW
SendNotifyMessageW
RegisterWindowMessageA
CloseDesktop
SetThreadDesktop
OpenInputDesktop
CreateWindowExW
RegisterClassExW
DefWindowProcW
RegisterWindowMessageW
LoadIconA
LoadCursorA
FindWindowA
KillTimer
SetTimer
DestroyWindow
CreateWindowExA
RegisterClassExA
UnregisterClassA
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
SystemParametersInfoW
PostThreadMessageW
IsWindowEnabled
GetThreadDesktop
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjects
CloseWindowStation
GetFocus
RegisterClassW
SetDlgItemTextW
GetAsyncKeyState
EnableWindow
SetActiveWindow
GetDC
ReleaseDC
GetWindowTextLengthW
EnumChildWindows
FindWindowExW
CreateIconFromResourceEx
MonitorFromWindow
GetMonitorInfoW
GetWindowInfo
GetAncestor
GetRawInputDeviceInfoW
GetRawInputDeviceList
DdeClientTransaction
SendDlgItemMessageW
LoadIconW
GetClipboardSequenceNumber
GetClipboardOwner
GetClipboardViewer
SetClipboardData
GetClipboardData
RegisterClipboardFormatW
CountClipboardFormats
EnumClipboardFormats
GetClipboardFormatNameA
GetClipboardFormatNameW
IsClipboardFormatAvailable
GetPriorityClipboardFormat
GetOpenClipboardWindow
CloseWindow
GetMessageW
GetWindowDC
BeginPaint
EndPaint
SetFocus
CallWindowProcW
GetClassInfoExW
IsChild
MoveWindow
CreateDialogIndirectParamW
SetCapture
ReleaseCapture
CreateAcceleratorTableW
DestroyAcceleratorTable
InvalidateRect
InvalidateRgn
RedrawWindow
GetClientRect
SetWindowContextHelpId
SetCursor
ClientToScreen
ScreenToClient
MapWindowPoints
GetSysColor
FillRect
LoadBitmapW
IsDialogMessageW
MapDialogRect
UpdateWindow
AdjustWindowRectEx
SetRect
IsRectEmpty
MonitorFromRect
UserHandleGrantAccess
GetWindow
EnumWindows
SetParent
GetWindowLongW
GetWindowTextW
IsWindow
GetDesktopWindow
GetWindowRect
SetForegroundWindow
GetSystemMetrics
BringWindowToTop
SendMessageTimeoutW
EnumDesktopWindows
SetWindowTextW
GetForegroundWindow
CharNextW
EndDialog
DialogBoxParamW
GetGUIThreadInfo
GetWindowThreadProcessId
FindWindowW
AllowSetForegroundWindow
SwitchToThisWindow
EmptyClipboard
CloseClipboard
OpenClipboard
SetWindowPos
ShowWindow
UnregisterClassW
PostMessageW
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
CreateDesktopW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetClassNameW
GetParent
MessageBoxW
RemovePropW
GetPropW
SetPropW
GetActiveWindow
GetDlgItem
SendMessageW
LoadCursorW
CryptGenKey
RegGetValueW
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegOpenKeyA
EqualSid
AllocateAndInitializeSid
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyW
ReportEventW
RegisterEventSourceW
CloseEventLog
ConvertSidToStringSidW
MakeAbsoluteSD
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
SetTokenInformation
GetSecurityDescriptorSacl
GetLengthSid
FreeSid
DuplicateTokenEx
CreateWellKnownSid
CopySid
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegEnumValueW
CreateProcessAsUserW
OpenThreadToken
AccessCheck
InitializeAcl
InitializeSecurityDescriptor
MapGenericMask
SetSecurityDescriptorDacl
GetNamedSecurityInfoW
SetThreadToken
GetAce
GetKernelObjectSecurity
SetKernelObjectSecurity
AddAce
GetAclInformation
RevertToSelf
RegDisablePredefinedCache
CreateRestrictedToken
DuplicateToken
LookupPrivilegeValueW
CheckTokenMembership
SaferiIsExecutableFileType
CryptAcquireContextA
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetKeyParam
CryptSetHashParam
CryptGetHashParam
CryptSetProvParam
CryptGetProvParam
CryptGenRandom
CryptGetUserKey
CryptImportKey
CryptDecrypt
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptSignHashA
CryptSignHashW
CryptContextAddRef
CredWriteW
CredReadW
CredDeleteW
CredFree
ImpersonateAnonymousToken
GetUserNameW
ord219
PathIsUNCServerShareW
UrlCanonicalizeW
PathCreateFromUrlW
PathIsUNCW
PathFindFileNameW
PathAddBackslashW
AssocQueryStringW
UrlGetPartW
PathIsDirectoryW
PathIsRelativeW
PathFindExtensionW
PathCombineW
SHDeleteKeyW
PathFindExtensionA
PathRemoveFileSpecW
PathFileExistsW
PathAppendW
PathRemoveBackslashW
PathCanonicalizeW
UrlIsW
PathIsURLW
AcroRd32IsBrokerProcess
GetWinstaDesktopInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ