Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
0658d0901d67343ebb72eb3599ad0d80_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0658d0901d67343ebb72eb3599ad0d80_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
0658d0901d67343ebb72eb3599ad0d80_JaffaCakes118
Size
748KB
MD5
0658d0901d67343ebb72eb3599ad0d80
SHA1
b053c9139d246ce5bc9dc41e26f327ecdd810426
SHA256
6d551a854228a9aa1ead82b4a208bb008247e0d4baccbd0dba7c56d4e71f1d57
SHA512
22f42bce8f3e21a2c62b538c07dd9f1a0c53381c00018321606c6d0e0fc77d84dfe6b024094c9dee1eaaf059a73d77c50c884fdcd16cc7d8a5f695e189205022
SSDEEP
12288:fGxtPYnDi1Nqs7OF8bfwxXWf7dQNS679bpmvBgPQb3ktRw+PEWNaTWmQcY10d+9S:fGxtoirqmOFCpf5S9bpKA2WEWNaT3Qpm
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrStrIW
StrCatW
StrCpyNW
wnsprintfW
PathFileExistsW
StrStrIA
StrChrW
wnsprintfA
StrCpyW
StrCmpW
StrStrW
InternetOpenUrlW
InternetReadFile
InternetOpenW
InternetGetConnectedState
InternetCloseHandle
GetComputerNameW
GetProcessHeap
GetVolumeInformationW
HeapAlloc
GetCurrentProcess
HeapFree
OpenProcess
GlobalAlloc
MultiByteToWideChar
lstrlenW
GetLastError
GlobalFree
FindClose
CloseHandle
LocalFree
GetFileSize
SetFilePointer
FreeResource
lstrlenA
FindResourceW
FreeLibrary
LoadResource
LoadLibraryExW
FlushFileBuffers
GetPrivateProfileStringW
WriteFile
WideCharToMultiByte
LoadLibraryW
SizeofResource
ReadFile
CreateFileW
WritePrivateProfileStringW
GetProcAddress
DeleteFileW
GetFullPathNameW
DosDateTimeToFileTime
MoveFileExW
SetFileTime
GetFileAttributesW
GetFileTime
lstrcpyW
LocalFileTimeToFileTime
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
VirtualQuery
CreateDirectoryW
CreateFileA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapSize
IsValidCodePage
GetSystemTimeAsFileTime
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
RtlUnwind
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
GetShellWindow
GetUserObjectSecurity
GetWindowThreadProcessId
RegSetValueExW
RegDeleteKeyW
RegOpenKeyW
RegEnumKeyW
AdjustTokenPrivileges
RegOpenKeyExW
IsValidSid
GetSecurityDescriptorOwner
LookupAccountSidW
LookupPrivilegeValueW
GetTokenInformation
GetUserNameW
ConvertSidToStringSidA
OpenProcessToken
RegCloseKey
RegQueryValueExW
RegCreateKeyW
ShellExecuteW
SHGetFolderPathW
CoUninitialize
CoInitialize
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ