Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
34952764936ebb9b86a7ae25f3d8a843_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34952764936ebb9b86a7ae25f3d8a843_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
34952764936ebb9b86a7ae25f3d8a843_JaffaCakes118
Size
539KB
MD5
34952764936ebb9b86a7ae25f3d8a843
SHA1
3228a0bafaa92f7366b911a6080986408c360544
SHA256
68a9804f1b92610df3e9a487c0bd9f66e235205fb34fe6b1b7a0c55215ee95df
SHA512
4f76ff10c6838cd88f36aaab18dc40e9bbb6cc4d3fd13c6f14ac6f3eb72498c5b8b081b132eb1374230cad3362928789cfeaecab70cef7300145dbee98c77609
SSDEEP
12288:S7SGGCY4Nmme4acxhQSApsU12exinYsUj9gboLAcE:S7lGCYdme4acxhsp3wYhWkLAcE
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateProcessA
GetModuleHandleA
SetFilePointer
ReadFile
CreateDirectoryA
LoadLibraryExA
DeleteFileA
GetVolumeInformationA
LocalFree
lstrlenA
SleepEx
lstrcatA
MultiByteToWideChar
GetCurrentDirectoryA
lstrcmpA
GetCurrentProcess
OpenProcess
GlobalAlloc
GlobalFree
lstrcmpiA
GetFullPathNameA
lstrcpyA
SetFileTime
GetFileTime
LocalFileTimeToFileTime
WaitForSingleObject
GetExitCodeProcess
TerminateProcess
SetLastError
GetModuleFileNameA
GetVersionExA
GetSystemTimeAsFileTime
ExitProcess
GetCurrentProcessId
SetEndOfFile
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteFile
Sleep
GetProcessHeap
HeapFree
HeapAlloc
OpenMutexA
GetFileAttributesA
CreateFileA
OpenFileMappingA
CloseHandle
CreateToolhelp32Snapshot
CreateFileMappingA
Process32Next
LoadLibraryA
GetProcAddress
GetLastError
WideCharToMultiByte
ExpandEnvironmentStringsA
Process32First
InterlockedDecrement
FreeLibrary
lstrcpynA
DosDateTimeToFileTime
MapViewOfFile
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
RaiseException
RtlUnwind
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
VirtualQuery
GetWindowThreadProcessId
GetClassNameA
EnumWindows
IsWindow
IsWindowVisible
GetUserObjectSecurity
GetShellWindow
GetUserNameA
IsValidSid
GetSecurityDescriptorOwner
LookupPrivilegeValueA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
ConvertSidToStringSidA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyA
RegEnumKeyA
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerA
QueryServiceStatus
CloseServiceHandle
OpenServiceA
AdjustTokenPrivileges
ShellExecuteA
ord680
SHGetFolderPathA
CoUninitialize
CoInitialize
CoCreateInstance
VariantClear
AssocQueryStringA
StrStrIA
wnsprintfA
StrChrA
StrDupA
PathFileExistsA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ