Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
18a0fecf062810d1df11ff16ddb50f89_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
18a0fecf062810d1df11ff16ddb50f89_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
18a0fecf062810d1df11ff16ddb50f89_JaffaCakes118
Size
1.1MB
MD5
18a0fecf062810d1df11ff16ddb50f89
SHA1
d07fb2da94b6724d7e90beed832413a07cc4cfe4
SHA256
42968e33dac7a067549d5df1a189a634585d061e8d93efcf52ddfeaf438b499f
SHA512
3bbfa154ff0c5578e796920f18e1604ca9f3d3f9bfacc8a0da1bce50cf1a656831e28b4670b15c90d512fde757b20b64ed543ccdaa2c40e1ad910fc15321c986
SSDEEP
24576:rVpg6ZcSf85Sjo3VRFYsWmvnKT8kYpRKKW9UjbSMhPl:x3OSE5SjkRFYsBfY8kYE9ObBv
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrStrA
StrNCatA
StrStrIA
wnsprintfA
StrChrA
StrToIntA
WritePrivateProfileStringA
LocalAlloc
LocalFree
CreateThread
GetLocalTime
GetVersionExA
GetCurrentProcessId
FindResourceA
GetExitCodeProcess
GetTempPathA
GetFileAttributesA
FindFirstFileA
FindClose
FindNextFileA
FreeResource
LoadResource
GlobalLock
GlobalAlloc
SizeofResource
MulDiv
GlobalUnlock
GlobalFree
LockResource
MoveFileExA
MultiByteToWideChar
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetPrivateProfileStringA
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
WideCharToMultiByte
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
GetCurrentProcess
FreeLibrary
ReadFile
WriteFile
HeapFree
HeapAlloc
GetFileSize
CreateFileA
lstrcpyA
CloseHandle
CreateToolhelp32Snapshot
Process32Next
Process32First
DeleteFileA
CreateMutexA
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetLastError
CreateDirectoryA
lstrlenW
lstrcatA
Sleep
GetWindowsDirectoryA
GetProcessHeap
GetTickCount
lstrcpynA
lstrlenA
lstrcmpA
ExitProcess
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
FlushFileBuffers
TlsGetValue
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
GetStartupInfoA
GetCommandLineA
RedrawWindow
GetWindowTextLengthA
IsDlgButtonChecked
CheckRadioButton
EnableWindow
FillRect
ReleaseDC
GetDlgItem
SetWindowTextA
GetWindowDC
GetDlgCtrlID
EndPaint
SetCursor
GetKeyState
GetFocus
GetParent
DrawTextA
BeginPaint
GetDC
GetWindowTextA
SetWindowLongA
InvalidateRect
PostMessageA
UpdateWindow
DestroyWindow
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SetFocus
SendMessageA
IsDialogMessageA
TranslateMessage
MessageBoxA
GetWindowLongA
CreateWindowExA
PeekMessageA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
FindWindowA
ExitWindowsEx
IsWindowEnabled
CreateDIBitmap
LPtoDP
GetDeviceCaps
DPtoLP
SetMapMode
GetMapMode
SetBkColor
GetStockObject
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
GetObjectA
TextOutA
GetTextExtentPointA
AdjustTokenPrivileges
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupPrivilegeValueA
SetNamedSecurityInfoA
RegOpenKeyExA
SetFileSecurityA
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
RegQueryValueExA
OpenProcessToken
RegOpenKeyA
RegCloseKey
RegCreateKeyA
RegSetValueExA
ShellExecuteA
SHGetFolderPathA
ShellExecuteExA
CreateStreamOnHGlobal
OleLoadPicture
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ