Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b0d1f2e84b8c5f9406a2a7e7e6b2a2f2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b0d1f2e84b8c5f9406a2a7e7e6b2a2f2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
b0d1f2e84b8c5f9406a2a7e7e6b2a2f2_JaffaCakes118
Size
1.2MB
MD5
b0d1f2e84b8c5f9406a2a7e7e6b2a2f2
SHA1
75f23c4ff65e18cbea9674ff6c2af9a82e410a3c
SHA256
f7df5cdcbf5c25df014806a1600a4437e9a0a0016d525e97c71f5e2176e5ae8a
SHA512
0fffb0437f48753c2d48cdeec603648912cd9ba8fb00c045f912a8e413493ff923b4ef9fa109700afa169d62e67a0e3a0478e40e18121c13b5b4a63968461868
SSDEEP
24576:m8+SizJpViDbtAoY75LYgWU3+P1gHE5TSng4iCxjvJBzIZAj1mx2cZGWP6KYGAPa:US4+DsH9GAPUDZnAakpuQQg3srGac89B
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PulseEvent
CloseHandle
SetHandleCount
lstrlenA
LoadResource
WriteFile
Wow64RevertWow64FsRedirection
GetStringTypeA
HeapReAlloc
HeapFree
GetEnvironmentStringsW
GetConsoleCP
Wow64SuspendThread
RemoveDirectoryA
GetCPInfo
WritePrivateProfileStructA
CreateToolhelp32Snapshot
SetVolumeMountPointA
FindFirstFileTransactedA
ReadFile
GetModuleHandleA
GetLastError
CreateFileA
GetFileSize
FatalAppExitA
SetProcessWorkingSetSize
WriteConsoleA
LoadLibraryA
SetConsoleCursorPosition
GetCurrentThreadId
GetCurrentProcess
FindResourceA
GetACP
CreateFileW
WriteConsoleOutputCharacterA
GlobalDeleteAtom
GetDateFormatA
GetSystemTimeAsFileTime
CompareStringA
GetStdHandle
RaiseException
TlsAlloc
SetEnvironmentVariableA
SetEndOfFile
VirtualAlloc
TlsFree
GetModuleHandleW
GetCommandLineA
GetLocaleInfoW
GlobalMemoryStatusEx
FreeEnvironmentStringsA
Heap32First
GetCurrentProcessId
LCMapStringA
EnumSystemLocalesA
CreateDirectoryA
InterlockedDecrement
IsValidLocale
DeleteCriticalSection
TlsSetValue
InitializeCriticalSection
CreateNamedPipeA
CreateDirectoryW
FindResourceExA
HeapSize
IsDebuggerPresent
SetCommBreak
CreateThread
DeleteFileA
SizeofResource
InitializeCriticalSectionAndSpinCount
QueryPerformanceFrequency
InitializeSListHead
SetStdHandle
HeapDestroy
Process32Next
SetConsoleOutputCP
GetComputerNameW
GetTickCount
InterlockedExchange
GetTimeFormatA
FreeLibrary
GetVersionExA
GetCurrentThread
SetLastError
WriteConsoleW
DeleteBoundaryDescriptor
GetStringTypeW
Process32First
FreeEnvironmentStringsW
HeapAlloc
CreateProcessA
WideCharToMultiByte
TerminateProcess
GetTimeZoneInformation
Sleep
GetEnvironmentVariableA
UnhandledExceptionFilter
LCMapStringW
GetModuleFileNameA
GetSystemDefaultLangID
GetLocaleInfoA
SetUnhandledExceptionFilter
GetConsoleOutputCP
RtlUnwind
SetFilePointer
GetModuleFileNameW
CompareStringW
GetProcessHeap
HeapCreate
GetProcAddress
CreateBoundaryDescriptorW
HeapUnlock
GetConsoleMode
VirtualFree
GetEnvironmentStrings
GetLongPathNameTransactedW
FlushFileBuffers
GetOEMCP
MultiByteToWideChar
ExitProcess
IsValidCodePage
InterlockedIncrement
LeaveCriticalSection
GetUserDefaultLCID
TlsGetValue
CreateMutexA
FlushProcessWriteBuffers
QueryPerformanceCounter
SetConsoleCtrlHandler
LockResource
GetStartupInfoA
GetFileType
EnterCriticalSection
SetFileApisToANSI
SetTimeZoneInformation
DlgDirSelectComboBoxExA
MessageBoxA
GetMenu
CharLowerA
EnumWindowStationsW
SetMenuItemInfoA
GetDlgCtrlID
DialogBoxParamA
SetForegroundWindow
PostMessageA
GetSystemMenu
SetClipboardViewer
SetWindowPos
GetFocus
GetDlgItem
GetRawInputDeviceInfoA
EnableMenuItem
SendMessageA
FindWindowExA
SetWindowContextHelpId
SwitchToThisWindow
EndDialog
LoadIconA
IntersectRect
CharUpperW
LoadImageW
RegCreateKeyTransactedA
BuildTrusteeWithNameW
RegOpenKeyExA
AccessCheckByTypeResultList
RegDeleteKeyValueW
WriteEncryptedFileRaw
LookupPrivilegeValueW
ObjectDeleteAuditAlarmW
RegCreateKeyA
CredEnumerateA
AddAccessDeniedAceEx
PerfIncrementULongLongCounterValue
CredReadW
CreateProcessAsUserW
RegSetValueExA
EventWriteString
AdjustTokenPrivileges
PerfStartProviderEx
FreeSid
AllocateAndInitializeSid
RegCloseKey
CredIsMarshaledCredentialW
RegDeleteTreeA
CheckTokenMembership
OpenProcessToken
RegEnumValueA
GetOldestEventLogRecord
ConvertSidToStringSidA
LookupPrivilegeValueA
RegQueryInfoKeyA
ord17
ord62
SHGetSpecialFolderPathA
SHFileOperationA
ord19
SHCreateDefaultExtractIcon
SHGetFolderPathA
VarUI2FromR8
VarI1FromUI2
VarBstrFromR8
VarDecDiv
VarI1FromStr
VarUI8FromR4
VarMod
VarBoolFromI4
VarI4FromDate
VarUI2FromDate
SysFreeString
SysAllocString
PathFindFileNameA
PathFileExistsA
PathIsUNCA
PathFindSuffixArrayA
IntlStrEqWorkerA
PathIsRelativeA
PathAppendA
AssocQueryKeyA
ord346
ord354
ord10
SHCreateStreamOnFileW
ord8
HttpOpenRequestA
InternetConnectA
EnumProcessModules
WTSQueryUserToken
WTSEnumerateServersA
WTSRegisterSessionNotification
WTSSetUserConfigW
WTSVirtualChannelRead
CoInitializeSecurity
CoCreateInstance
CoInitializeEx
CoUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ