Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
24e27c242335262635c2a2d2963b82a9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24e27c242335262635c2a2d2963b82a9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
24e27c242335262635c2a2d2963b82a9_JaffaCakes118
Size
912KB
MD5
24e27c242335262635c2a2d2963b82a9
SHA1
5f63be9bc822a2d37344d162e7af908460a97877
SHA256
7404ab0e7533acd72e245cbc619b46b496e5db58598ccb43aecfe7a6621f57b3
SHA512
72daf4f2fde5861c6aeb1e429ac3e011b890bbed2a888b2d39725fce872aa170e0802a5294e414e27430c91890df61eb316d6f195dc1b7b03e11b6b1bf80d893
SSDEEP
24576:He6RLEq4m3HiWnuDE2GRmILjhsJwMMwZNEk4:HdRf4SCUuDE2GcIL14MuN6
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetCloseHandle
InternetGetConnectedState
InternetReadFile
InternetOpenUrlW
HttpQueryInfoW
InternetOpenW
ord17
MoveFileExW
GetTickCount
WideCharToMultiByte
Sleep
GetVersionExW
GetExitCodeProcess
GetModuleFileNameW
FindResourceW
LoadResource
GlobalLock
WaitForSingleObject
WriteFile
SizeofResource
CreateFileW
GlobalUnlock
GetCurrentDirectoryW
LockResource
SetCurrentDirectoryW
CreateDirectoryW
TerminateThread
WritePrivateProfileStringW
CreateThread
GetTempPathW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
DeleteFileW
FreeResource
LoadLibraryW
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
lstrlenA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
RtlUnwind
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
ExitProcess
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateMutexW
CloseHandle
VirtualQuery
GlobalFree
GetLastError
lstrlenW
MultiByteToWideChar
GlobalAlloc
OpenProcess
HeapFree
GetCurrentProcess
HeapAlloc
GetVolumeInformationW
GetProcessHeap
GetComputerNameW
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
TerminateProcess
RaiseException
LoadLibraryA
InterlockedExchange
FreeLibrary
GetProcAddress
LocalAlloc
FindWindowW
MessageBoxW
GetWindowThreadProcessId
ReleaseDC
SetForegroundWindow
PostMessageW
EnumWindows
UpdateWindow
SetWindowTextW
DestroyWindow
AnimateWindow
UpdateLayeredWindow
GetWindowRect
GetMessageW
PostQuitMessage
SetCapture
SetFocus
GetDC
TranslateMessage
LoadIconW
SystemParametersInfoW
GetClassNameW
DefWindowProcW
SetWindowPos
GetCursorPos
SetLayeredWindowAttributes
ReleaseCapture
DispatchMessageW
LockWindowUpdate
GetWindowTextW
ShowWindow
CheckRadioButton
TrackMouseEvent
InvalidateRect
DrawFrameControl
EndPaint
SetCursor
GetWindowDC
GetParent
LoadCursorW
GetClientRect
BeginPaint
RegisterClassExW
GetWindowLongW
GetDlgItem
SetWindowLongW
CreateWindowExW
SendMessageW
EnableWindow
GetDlgCtrlID
GetShellWindow
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
SetTextColor
SetBkMode
GetStockObject
CreateSolidBrush
SetBkColor
RegOpenKeyW
LookupAccountSidW
RegQueryValueExW
RegCreateKeyW
GetTokenInformation
GetUserNameW
OpenProcessToken
RegCloseKey
ShellExecuteExW
SHGetFolderPathW
ord680
ShellExecuteW
OleInitialize
OleUninitialize
CreateStreamOnHGlobal
StrStrIW
StrCmpW
StrCatW
StrCpyW
StrNCatW
UrlEscapeW
StrCmpIW
StrCpyNW
wnsprintfW
PathFileExistsW
WinVerifyTrust
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ