Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
af1d6631b6592d7ec8a9b31b5642236a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
af1d6631b6592d7ec8a9b31b5642236a_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
af1d6631b6592d7ec8a9b31b5642236a_JaffaCakes118
Size
1.8MB
MD5
af1d6631b6592d7ec8a9b31b5642236a
SHA1
f36e6a0484712e0227124c64d64e9cdd1181dda7
SHA256
14faa1b0fb8677b81bd5ffd7b1b26b34de69f322d432d2a0e537090cd5f80218
SHA512
eb6a5290bc162922fbc2e7b78c2e71f66772d76f1eafa95a13ac05c80dd45ad7cf06be564f43db6ea2fc901230a7e0c89fe8c8e0127d3989bdef4ddd7cf6b38d
SSDEEP
49152:P5LSiJUiOPHwxPfmMp+lKuJqccYzq6oNXes6vo:P52iJX+QxmMpkKuJ7cSq6Q0vo
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteFileW
MoveFileExW
FindNextFileW
FindClose
RemoveDirectoryW
lstrcmpiW
CopyFileW
CreateToolhelp32Snapshot
Process32FirstW
GetCurrentProcess
OpenProcess
SetLastError
TerminateProcess
Process32NextW
GetLastError
LocalFree
GetTempPathW
GetTempFileNameW
GetSystemDirectoryW
LocalAlloc
WriteFile
WideCharToMultiByte
MultiByteToWideChar
SetEndOfFile
LCMapStringW
FindFirstFileExW
HeapSize
GetStringTypeW
OutputDebugStringW
HeapReAlloc
FindResourceW
GetOEMCP
GetACP
IsValidCodePage
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
GetFileType
GetStdHandle
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleExW
CloseHandle
CreateProcessW
InterlockedDecrement
InterlockedIncrement
FreeResource
SizeofResource
LockResource
LoadResource
GetSystemTime
GetPrivateProfileStringW
lstrlenW
CreateFileW
lstrcpyW
WritePrivateProfileStringW
GetExitCodeThread
WaitForSingleObject
Sleep
CreateDirectoryW
GetVersionExW
LoadLibraryW
FreeLibrary
lstrcpynW
GetModuleHandleW
GetModuleFileNameW
OpenMutexW
lstrcmpW
ExitProcess
GetConsoleMode
GetConsoleCP
RtlUnwind
GetProcessHeap
RaiseException
IsProcessorFeaturePresent
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
GetCommandLineW
lstrcatW
GetCPInfo
GetSystemTimeAsFileTime
HeapAlloc
LoadLibraryExW
GetProcAddress
ExitThread
GetCurrentThreadId
CreateThread
DecodePointer
EncodePointer
HeapFree
ReadFile
SetFileAttributesW
AreFileApisANSI
CreateFileA
SetFilePointer
ReadConsoleW
TranslateMessage
LoadBitmapW
CreateWindowExW
SendMessageW
SetWindowTextW
GetClientRect
FillRect
DrawIcon
GetWindowTextW
GetSysColor
GetWindowRect
GetSystemMetrics
LoadIconW
SetWindowPos
LoadStringW
GetSysColorBrush
ShowWindow
wsprintfW
PostQuitMessage
MessageBoxW
SetTimer
KillTimer
GetDesktopWindow
DispatchMessageW
SetWindowTextA
PostMessageW
GetMessageW
GetFocus
FindWindowExW
GetParent
GetClassNameW
SetFocus
EnableWindow
SetWindowLongW
EndPaint
BeginPaint
DefWindowProcW
GetWindowLongW
RegisterClassExW
LoadCursorW
UpdateWindow
GetStockObject
GetObjectW
SetBkColor
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
CreateFontIndirectW
RegSetValueExW
GetUserNameW
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegCreateKeyExW
SHGetFileInfoW
SHGetDesktopFolder
ExtractIconW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
CoUninitialize
CoCreateInstance
CoInitialize
InitCommonControlsEx
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
StrRChrIW
StrStrIW
PathFileExistsW
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ