Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ae6bed03b62ad8c362ae5c9237af44c8_JaffaCakes118.exe
Resource
win7-20240611-en
Target
ae6bed03b62ad8c362ae5c9237af44c8_JaffaCakes118
Size
777KB
MD5
ae6bed03b62ad8c362ae5c9237af44c8
SHA1
662e14121e7a390a21aae886c2a114f4d1d464dc
SHA256
763f016d9c35f1c3342e5e909227ac698244a75ae98ece00a83d4400cbf6ab16
SHA512
bcb22f488223ce9f915b4720a591da7b7e126ae4c7d339df74c1394fcd6fb4bef7687b6dab077ce9129bc560153add9e417e7503b2db65b123e6e91b3aec0163
SSDEEP
12288:rKvO2Eq9Yo0ydSETsKsCbr68o/6EHYQvVPrWzFsoGTFiCYrE/iD+6cR+IZG/t3S:rKvO2EqUySEQKZi31rAFXGT4PrGZqQ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\teamcity-agent\work\Trunk2017\build.msvc\Win32\Installer-Release\BootstrapperClient\RobloxPlayerLauncher.pdb
DeleteCriticalSection
RaiseException
DecodePointer
CreateEventA
WideCharToMultiByte
MultiByteToWideChar
DeleteFileW
GetModuleHandleW
OpenEventW
CreateEventW
CreateMutexW
lstrcmpW
CloseHandle
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetLastError
GetProcessHeap
HeapSize
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetEndOfFile
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
GetStdHandle
ExitProcess
SetFilePointerEx
GetFileType
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetCommandLineW
GetCommandLineA
LoadLibraryExW
HeapFree
HeapReAlloc
HeapAlloc
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
OutputDebugStringW
IsDebuggerPresent
lstrcatW
lstrcpyW
HeapDestroy
GetProcAddress
LocalFree
FormatMessageA
LockResource
FreeLibrary
LoadResource
SizeofResource
LoadLibraryW
FindResourceW
FindResourceExW
CreateDirectoryW
CreateFileW
GetFileAttributesW
GetVersionExW
GetCurrentThreadId
FindClose
FormatMessageW
FindFirstFileW
FindNextFileW
GetSystemTime
GetTempPathW
WaitForSingleObjectEx
VerSetConditionMask
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
OpenProcess
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
GetCurrentThread
Sleep
GetLocalTime
SystemTimeToFileTime
CompareFileTime
GetTickCount
MapViewOfFile
UnmapViewOfFile
lstrlenW
CreateFileMappingW
GetModuleFileNameW
CreateProcessW
GetDiskFreeSpaceExW
RemoveDirectoryW
SetFileAttributesW
VerifyVersionInfoW
GetGeoInfoW
GetUserGeoID
GetSystemTimeAsFileTime
CreateSemaphoreA
ReleaseSemaphore
DuplicateHandle
GetModuleHandleA
InterlockedExchangeAdd
InterlockedCompareExchange
TerminateThread
SetLastError
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
QueueUserAPC
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SleepEx
CreateSemaphoreW
SetWaitableTimer
GetShortPathNameW
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FileTimeToSystemTime
QueryPerformanceCounter
QueryPerformanceFrequency
OpenEventA
WaitForMultipleObjectsEx
GetCurrentProcessId
ResumeThread
CreateWaitableTimerW
GetFileSizeEx
SetFileTime
GetFileAttributesExW
GetFileSize
WriteFile
ReadFile
GetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrcmpiW
GetParent
GetWindowLongW
GetWindowRect
InvalidateRect
ShowWindow
CreateWindowExW
CallWindowProcW
DefWindowProcW
SendMessageW
MessageBoxA
AllowSetForegroundWindow
CharNextW
CharUpperW
SetWindowLongW
SetTimer
GetWindowTextW
SetForegroundWindow
IsWindowVisible
PostMessageW
LoadBitmapW
LoadIconW
FillRect
EndPaint
BeginPaint
ReleaseDC
GetDC
GetSystemMetrics
EnableWindow
KillTimer
GetMessageW
TranslateMessage
DispatchMessageW
PostThreadMessageW
SetWindowPos
SetFocus
LoadAcceleratorsW
TranslateAcceleratorW
SetWindowTextW
MessageBoxW
EnumWindows
GetWindowThreadProcessId
PostQuitMessage
RegisterClassW
DestroyWindow
GetDlgItem
GetStockObject
SetBkMode
CreatePen
CreateFontW
SetTextColor
GetDeviceCaps
Rectangle
CreateSolidBrush
DeleteObject
SelectObject
CopySid
RegOpenKeyExW
RegCloseKey
GetUserNameW
CheckTokenMembership
RegDeleteKeyW
RegEnumKeyExW
RegEnumValueW
RegFlushKey
RegQueryInfoKeyW
CryptAcquireContextW
RegCreateKeyExW
RegDeleteValueW
RegQueryValueExW
DuplicateToken
OpenProcessToken
OpenThreadToken
IsValidSid
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
GetLengthSid
RegSetValueExW
GetTokenInformation
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
ShellExecuteW
ShellExecuteExW
CommandLineToArgvW
SHGetFolderPathAndSubDirW
RegisterTypeLi
StrCpyW
StrRChrW
PathFileExistsW
StrCmpNW
SHDeleteKeyW
StrCmpW
StrStrW
PathAddBackslashW
StrDupW
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
IsNetworkAlive
UnloadUserProfile
socket
sendto
send
htons
freeaddrinfo
getaddrinfo
WSASocketW
WSASend
WSARecv
WSAGetLastError
WSASetLastError
WSACleanup
WSAStartup
setsockopt
select
getsockopt
ioctlsocket
connect
closesocket
HttpSendRequestExW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
HttpEndRequestW
InternetQueryOptionW
InternetQueryOptionA
InternetOpenW
InternetConnectW
HttpQueryInfoW
InternetReadFile
InternetWriteFile
InternetCloseHandle
InternetSetOptionW
InternetQueryDataAvailable
_TrackMouseEvent
InitCommonControlsEx
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateHBITMAPFromBitmap
GdipAlloc
GdipFree
timeBeginPeriod
timeSetEvent
timeGetDevCaps
timeGetTime
EnumProcesses
GetProcessImageFileNameW
GetAdaptersInfo
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CoCreateGuid
CoCreateInstance
StringFromGUID2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ