Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2ff2a84ea656b9ca808051eed7d3471d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ff2a84ea656b9ca808051eed7d3471d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
2ff2a84ea656b9ca808051eed7d3471d_JaffaCakes118
Size
555KB
MD5
2ff2a84ea656b9ca808051eed7d3471d
SHA1
2f9f7cc5502cfbe55f4bcdbf27c905012ed0b6d5
SHA256
cfb700f5dfb37e29debc37bb7cefc501f8a45820c5099db9d77d4cdf9144f349
SHA512
ce9dc46298e6aa7c197adad404ff2e9c6afb205e205c6c1f4e5e45c31dc2af89ad216ebabac37d81ab03d98b9c705bc0ebbdff63d11d941e131f5d46ef6c5143
SSDEEP
12288:V6WnTwGPKZqk47F6NRYUOoFv128d/nLETwFbs9sCaNlTMfSsrL+IvRk:V66TwGPoqkHkiggb8sCaN9MxL+IvRk
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\build\source\rnmininst\rel32s\rnmininst.pdb
CoCreateInstance
OleCreate
OleSetContainedObject
CoInitialize
OleInitialize
OleUninitialize
CoUninitialize
PathFileExistsA
SHDeleteKeyA
SHDeleteValueA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetTimeToSystemTime
InternetCrackUrlA
InternetGetLastResponseInfoA
InternetGetConnectedState
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
CreateDialogParamA
IsWindowVisible
PostMessageA
LoadStringA
SendDlgItemMessageA
PeekMessageA
GetSysColor
EnableWindow
KillTimer
RedrawWindow
GetClassInfoExA
LoadCursorA
RegisterClassExA
GetWindowTextA
GetClassNameA
GetSystemMetrics
CreateWindowExA
UpdateWindow
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
CharNextA
CharPrevA
SetWindowRgn
DestroyWindow
ClientToScreen
GetFocus
DefWindowProcA
GetForegroundWindow
GetCursorPos
PtInRect
InvalidateRect
BeginPaint
EndPaint
SetWindowTextA
LoadIconA
SendMessageA
GetSystemMenu
EnableMenuItem
SetDlgItemTextA
GetDlgItem
SetForegroundWindow
SetActiveWindow
SetFocus
ShowWindow
GetWindowRect
ScreenToClient
SetWindowPos
EndDialog
GetDC
ReleaseDC
DrawTextW
SetWindowLongA
GetClientRect
GetWindowLongA
GetAsyncKeyState
MessageBoxA
GetShellWindow
GetWindowThreadProcessId
EnumWindows
VariantClear
SysAllocString
VariantInit
SysFreeString
SysAllocStringLen
SysStringLen
GetObjectA
BitBlt
StretchBlt
SetBkMode
SetTextColor
CreateBitmap
SelectObject
DeleteDC
GetTextExtentPointW
CreateFontW
DeleteObject
CreateSolidBrush
GetDeviceCaps
CreatePatternBrush
CombineRgn
GetPixel
CreateRectRgn
SetPixel
CreateCompatibleDC
ConvertStringSidToSidW
LookupAccountSidW
RegEnumKeyExA
IsValidSid
GetLengthSid
InitializeAcl
AddAccessDeniedAce
AddAccessAllowedAce
DuplicateTokenEx
InitializeSecurityDescriptor
RegSetValueA
RegOpenKeyA
OpenProcessToken
GetTokenInformation
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
FreeSid
GetUserNameA
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
LookupAccountNameA
AllocateAndInitializeSid
ConvertSidToStringSidW
ShellExecuteExA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderPathA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
TransparentBlt
GetUserNameExW
GetConsoleMode
GetConsoleCP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
GetSystemTimeAsFileTime
SetFilePointer
GetCommandLineA
GetStartupInfoA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
GetFileType
GetCPInfo
DeleteCriticalSection
GetACP
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CopyFileA
GetCurrentDirectoryA
GetVersion
GetSystemInfo
GetWindowsDirectoryA
MoveFileA
CreateDirectoryA
GetFileAttributesA
GetTempPathA
GetTempFileNameA
InterlockedDecrement
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
GetModuleHandleW
ExitProcess
SetEnvironmentVariableA
SetCurrentDirectoryA
GetFullPathNameA
SetEndOfFile
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
VirtualAlloc
SetHandleCount
GetStdHandle
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetTimeZoneInformation
FlushFileBuffers
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
CompareStringA
CompareStringW
InitializeCriticalSection
ConnectNamedPipe
InterlockedIncrement
LocalFree
GetFileTime
SystemTimeToFileTime
CompareFileTime
GetDriveTypeA
FreeResource
WaitForSingleObject
GetExitCodeProcess
GetNamedPipeHandleStateA
SetErrorMode
RaiseException
GetLastError
lstrcpyA
lstrlenA
CloseHandle
ReadFile
PeekNamedPipe
WriteFile
SetEnvironmentVariableW
CreateNamedPipeA
CreateProcessA
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetVersionExA
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
RemoveDirectoryA
FindClose
DeleteFileA
FindNextFileA
MoveFileExA
FindFirstFileA
GetModuleFileNameA
GetCurrentProcess
GetModuleHandleA
GetFileSize
CreateFileA
MultiByteToWideChar
GetPrivateProfileStringA
WritePrivateProfileStringA
GlobalFree
GlobalAlloc
Sleep
GetTickCount
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateMutexA
OpenMutexA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
TerminateProcess
GetLocaleInfoA
CreateThread
CryptMsgGetParam
CertFindCertificateInStore
CertGetNameStringW
CertFreeCertificateContext
CryptMsgClose
CertCloseStore
CryptQueryObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ