Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
20ebc8c8a59c8c0555473ea7dceb3917_JaffaCakes118.exe
Resource
win7-20240419-en
Target
20ebc8c8a59c8c0555473ea7dceb3917_JaffaCakes118
Size
108KB
MD5
20ebc8c8a59c8c0555473ea7dceb3917
SHA1
2ab4d6ea573388e7f5ecb040c01833309a9cb75d
SHA256
e46e31f18fff347507b937316f34f214b5a7701917edfe26c0aa0cfea4f299f5
SHA512
9128f6d50a687b365f2e9d6d982db55980520677794f407ffbaffc76909004fc2e17338c0a9a3bc62e2902a27afe068c6f39a3569f8695a8ef14a0c3747eb47e
SSDEEP
3072:mCrRG9LEWHyMp6awrpEoNLna7EP7N5Ltgxx:mCrs0JaYvnDPdgf
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindFirstFileA
FindFirstFileExA
FindNextFileA
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetComputerNameA
GetComputerNameExW
GetComputerNameW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFileAttributesExW
GetFileSize
GetFileTime
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetOverlappedResult
GetProcAddress
GetProcessHeap
GetProcessTimes
GetQueuedCompletionStatus
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetSystemTimeAdjustment
GetSystemTimeAsFileTime
GetThreadTimes
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedDecrement
EnumSystemLocalesA
IsBadStringPtrW
FindClose
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenEventA
OpenEventW
OpenProcess
OutputDebugStringW
PostQueuedCompletionStatus
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
ReleaseMutex
ResetEvent
RtlUnwind
SetConsoleActiveScreenBuffer
SetConsoleCtrlHandler
SetConsoleCursorPosition
SetConsoleMode
SetConsoleScreenBufferSize
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFilePointerEx
SetHandleCount
SetHandleInformation
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForMultipleObjectsEx
WaitForSingleObject
WaitForSingleObjectEx
WaitNamedPipeA
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcatA
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyA
lstrcpyW
lstrcpynA
lstrcpynW
lstrlenA
lstrlenW
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
FillConsoleOutputCharacterW
FillConsoleOutputAttribute
FileTimeToSystemTime
ExpandEnvironmentStringsW
IsDebuggerPresent
ExitProcess
DecodePointer
CreateThread
CreateProcessA
CreatePipe
CreateNamedPipeA
CreateMutexA
CreateIoCompletionPort
CreateFileW
CreateFileMappingA
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryA
CreateConsoleScreenBuffer
ConnectNamedPipe
CompareStringW
CompareStringA
CloseHandle
InterlockedIncrement
AddAtomA
LoadIconW
GetDesktopWindow
GetStockObject
GetObjectA
CreateSolidBrush
CreateFontIndirectA
GetTextExtentPoint32A
RegQueryValueExA
CopySid
EqualSid
GetLengthSid
SystemFunction036
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
RegSetValueExA
AllocateAndInitializeSid
RegOpenKeyA
RegCreateKeyA
RegCloseKey
InitializeSecurityDescriptor
GetUserNameA
SHQueryRecycleBinA
SHIsFileAvailableOffline
SHInvokePrinterCommandA
SHGetSpecialFolderPathA
SHGetMalloc
SHGetIconOverlayIndexW
SHGetFileInfoA
SHGetDiskFreeSpaceExA
SHGetDiskFreeSpaceA
SHGetDesktopFolder
SHFileOperationW
SHCreateDirectoryExW
SHCreateDirectoryExA
SHChangeNotify
SHBrowseForFolderA
FindExecutableW
ExtractIconW
ExtractIconExW
ExtractIconExA
ExtractIconEx
DragQueryPoint
DragQueryFileA
DragAcceptFiles
CommandLineToArgvW
Shell_NotifyIconA
Shell_NotifyIcon
ShellExecuteExA
ShellAboutA
SHQueryRecycleBinW
CoTaskMemAlloc
StrRChrIW
StrRStrIA
StrStrA
StrStrIA
StrStrW
StrCmpNIW
StrChrA
StrRChrIA
ImageList_Destroy
ImageList_Create
ImageList_DrawIndirect
ImageList_GetImageCount
ImageList_LoadImageW
InitCommonControlsEx
ImageList_AddMasked
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ