Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ab947d6534017b6300e8d373e2ae1b45_JaffaCakes118.exe
Resource
win7-20240508-en
Target
ab947d6534017b6300e8d373e2ae1b45_JaffaCakes118
Size
839KB
MD5
ab947d6534017b6300e8d373e2ae1b45
SHA1
cb0a76d7f83f82ae7538aafc22d15f7a947166b2
SHA256
d2578fadaea9a71298511deaf9d6692135fd8106e3454ff99a3550d265e5f731
SHA512
62e8a35fc766ce810459827e952abc2655621e128a5eeed79be9f090d4e7ac0a820bcf967171b2d5bdfc4e5f32e2acc31bdffd54e67a5dd45feb7293fec84328
SSDEEP
12288:Hz96Aq8A48e7C7Gx3Ebz+x5hsIGfOFp8UGNLmTFkdm9dSf0Z/aGBc:T99q8A4p+iUbztkpZSLmTKD+/zc
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\teamcity-agent\work\2cdd6a239545233d\build.msvc\Win32\Installer-Release\BootstrapperQTStudio\RobloxStudioLauncherBeta.pdb
DeleteCriticalSection
RaiseException
DecodePointer
CreateEventA
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleW
OpenEventW
CreateEventW
OpenMutexW
CreateMutexW
lstrcmpW
CloseHandle
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetLastError
GetProcessHeap
HeapSize
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetEndOfFile
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
GetStdHandle
ExitProcess
SetFilePointerEx
GetFileType
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetCommandLineW
GetCommandLineA
LoadLibraryExW
HeapFree
HeapReAlloc
HeapAlloc
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
OutputDebugStringW
IsDebuggerPresent
lstrcatW
lstrcpyW
HeapDestroy
GetProcAddress
LocalFree
FormatMessageA
LockResource
FreeLibrary
LoadResource
SizeofResource
LoadLibraryW
FindResourceW
FindResourceExW
CreateDirectoryW
CreateFileW
GetFileAttributesW
GetVersionExW
GetCurrentThreadId
FindClose
FormatMessageW
DeleteFileW
FindFirstFileW
FindNextFileW
VerSetConditionMask
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
OpenProcess
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
GetCurrentThread
Sleep
GetSystemTime
GetLocalTime
SystemTimeToFileTime
CompareFileTime
GetTickCount
MapViewOfFile
UnmapViewOfFile
lstrlenW
CreateFileMappingW
GetModuleFileNameW
CreateProcessW
GetDiskFreeSpaceExW
RemoveDirectoryW
SetFileAttributesW
VerifyVersionInfoW
GetGeoInfoW
GetUserGeoID
GetSystemTimeAsFileTime
CreateSemaphoreA
WaitForSingleObjectEx
ReleaseSemaphore
DuplicateHandle
GetModuleHandleA
InterlockedExchangeAdd
InterlockedCompareExchange
TerminateThread
SetLastError
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
QueueUserAPC
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SleepEx
CreateSemaphoreW
SetWaitableTimer
GetShortPathNameW
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
OpenEventA
WaitForMultipleObjectsEx
GetCurrentProcessId
ResumeThread
CreateWaitableTimerW
GetFileSizeEx
SetFileTime
GetFileAttributesExW
GetTempPathW
FileTimeToSystemTime
QueryPerformanceCounter
QueryPerformanceFrequency
GetFileSize
WriteFile
ReadFile
GetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrcmpiW
GetParent
GetWindowLongW
GetWindowRect
InvalidateRect
ShowWindow
CreateWindowExW
CallWindowProcW
DefWindowProcW
SendMessageW
MessageBoxA
SetWindowLongW
GetWindowTextW
SetForegroundWindow
IsWindowVisible
PostMessageW
LoadBitmapW
LoadIconW
FillRect
EndPaint
BeginPaint
ReleaseDC
GetDC
GetSystemMetrics
EnableWindow
KillTimer
SetTimer
GetDlgItem
DestroyWindow
RegisterClassW
GetMessageW
TranslateMessage
DispatchMessageW
PostThreadMessageW
SetWindowPos
CharUpperW
CharNextW
SetFocus
LoadAcceleratorsW
TranslateAcceleratorW
SetWindowTextW
MessageBoxW
EnumWindows
GetWindowThreadProcessId
PostQuitMessage
Rectangle
GetStockObject
GetDeviceCaps
SetBkMode
CreateSolidBrush
DeleteObject
CreateFontW
CreatePen
SetTextColor
SelectObject
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegEnumKeyExW
RegEnumValueW
RegFlushKey
RegQueryInfoKeyW
CryptAcquireContextW
RegCreateKeyExW
RegQueryValueExW
DuplicateToken
OpenProcessToken
OpenThreadToken
IsValidSid
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
GetLengthSid
CopySid
RegDeleteKeyW
GetUserNameW
CheckTokenMembership
GetTokenInformation
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
SHGetFolderPathAndSubDirW
ShellExecuteW
CommandLineToArgvW
ShellExecuteExW
CoInitialize
CoUninitialize
StringFromGUID2
CreateStreamOnHGlobal
CoCreateInstance
CoCreateGuid
RegisterTypeLi
StrCpyW
PathFileExistsW
StrCmpNW
SHDeleteKeyW
StrCmpW
StrStrW
PathAddBackslashW
StrRChrW
StrDupW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
IsNetworkAlive
UnloadUserProfile
freeaddrinfo
getaddrinfo
WSASocketW
WSASend
WSARecv
WSAGetLastError
WSASetLastError
htons
WSAStartup
setsockopt
send
select
getsockopt
ioctlsocket
connect
closesocket
sendto
WSACleanup
socket
HttpAddRequestHeadersW
HttpOpenRequestW
InternetSetOptionW
InternetQueryOptionW
InternetQueryOptionA
HttpSendRequestW
InternetWriteFile
InternetReadFile
InternetConnectW
InternetCloseHandle
InternetOpenW
HttpSendRequestExW
HttpEndRequestW
HttpQueryInfoW
InternetQueryDataAvailable
InitCommonControlsEx
_TrackMouseEvent
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateHBITMAPFromBitmap
GdipFree
GdipAlloc
GdiplusStartup
GetProcessImageFileNameW
EnumProcesses
timeSetEvent
timeGetDevCaps
timeBeginPeriod
timeGetTime
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ