Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118
Size
612KB
MD5
35e0ad8c45cb719eb5b7538a0563ad21
SHA1
888538647c48f2d8fc431be0929aad988ced4d73
SHA256
3f6aa25f3e753b457690bb50bd7ebddaab3239d5bf31154a0e66d87cda7d5d4d
SHA512
4ed9358f2ffbe45f21e472b4289027fa7f63f72ae74389779cc4baeb300f2ce0f4a0f607e31a9de50e9a127abc681bfb011e99fc6e18d3524dd90f7be7ca053d
SSDEEP
12288:QeJFjRaMKczxLvnU5Q0TPlO4HBOtyCHdvu:QQFcOlLvnU3TPlOoBMHd2
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\tfs.vs2010.win7\admin\windows\MAIN\Installer.FreezeWrapStub.Application\Release\FreezeWrapStub.pdb
ExpandEnvironmentStringsForUserA
EnumProcesses
GetModuleFileNameExA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
InternetCrackUrlA
InternetCombineUrlA
InternetGetCookieA
InternetSetCookieA
InternetCloseHandle
InternetOpenA
InternetSetStatusCallback
InternetSetOptionA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
HttpQueryInfoA
InternetErrorDlg
InternetReadFileExA
InterlockedDecrement
FreeResource
lstrcmpW
CompareStringA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpA
InterlockedExchange
GetLocaleInfoA
ConvertDefaultLocale
GetCurrentThread
SetThreadPriority
SuspendThread
GetModuleHandleW
InterlockedIncrement
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
GetModuleFileNameW
SetEndOfFile
SetErrorMode
GetCommandLineA
GetStartupInfoA
GetTimeFormatA
GetDateFormatA
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
ExitProcess
ExitThread
CreateThread
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
WaitForMultipleObjects
GetTimeZoneInformation
FileTimeToSystemTime
SystemTimeToFileTime
SetFilePointer
WriteFile
ReadFile
GetFileSize
CreateFileA
ResumeThread
GetLongPathNameA
GetModuleFileNameA
MoveFileA
GetFileAttributesA
CopyFileA
RemoveDirectoryA
DeleteFileA
GetSystemTime
CreateDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetCurrentProcessId
Module32Next
Module32First
TerminateProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateProcessA
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventA
ExpandEnvironmentStringsA
GetSystemDirectoryA
GetWindowsDirectoryA
GetSystemInfo
GetVersionExA
GetTempPathA
CloseHandle
GetProcAddress
GetExitCodeProcess
OpenProcess
WaitForSingleObject
GetCurrentProcess
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetCurrentThreadId
GetLocalTime
GetUserDefaultUILanguage
FindResourceExA
LoadLibraryExA
FreeLibrary
EnumResourceLanguagesA
EnumResourceNamesA
LoadLibraryA
EndUpdateResourceA
HeapFree
UpdateResourceA
GetProcessHeap
HeapAlloc
BeginUpdateResourceA
LocalFree
lstrlenA
LocalAlloc
GetModuleHandleA
FormatMessageA
SetFileAttributesA
GetTickCount
CreateMutexA
ReleaseMutex
Sleep
GetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
FlushFileBuffers
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnregisterClassA
LoadCursorA
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
ShowWindow
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
DefWindowProcA
GetMenu
SetWindowPos
IsIconic
GetWindowPlacement
GetWindow
ReleaseDC
GetDC
GetClientRect
CopyRect
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetNextDlgTabItem
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowRect
GetDesktopWindow
FindWindowA
EnumChildWindows
GetClassNameA
FindWindowExA
SetForegroundWindow
IsWindowEnabled
EnumWindows
SystemParametersInfoA
GetSystemMetrics
GetWindowThreadProcessId
GetShellWindow
LoadStringA
LoadIconA
SetTimer
PostMessageA
DestroyMenu
MessageBoxA
WaitForInputIdle
MessageBoxExA
RedrawWindow
KillTimer
IsWindowVisible
UpdateWindow
EnableWindow
SendMessageA
IsWindow
GetDlgItem
SetWindowTextA
SetWindowLongA
EndDialog
GetSysColorBrush
GetSysColor
GetDlgCtrlID
GetWindowLongA
DialogBoxParamA
CreateWindowExA
CallWindowProcA
DeleteDC
GetStockObject
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetTextColor
GetClipBox
GetDeviceCaps
SetBkColor
TextOutA
RectVisible
PtVisible
DeleteObject
SetViewportExtEx
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RevertToSelf
RegOpenUserClassesRoot
RegOpenCurrentUser
AdjustTokenPrivileges
GetLengthSid
ImpersonateLoggedOnUser
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
CreateProcessAsUserA
ShellExecuteExA
SHGetSpecialFolderPathA
InitCommonControlsEx
PathCombineA
PathFindExtensionA
PathStripPathA
PathRemoveFileSpecA
SHDeleteEmptyKeyA
UrlEscapeA
PathFindFileNameA
PathRenameExtensionA
CoCreateInstance
CoCreateGuid
StringFromGUID2
OleUninitialize
OleInitialize
CoTaskMemAlloc
SafeArrayAccessData
SafeArrayUnaccessData
VariantInit
VariantChangeType
VariantClear
SafeArrayDestroy
SysAllocStringLen
SysFreeString
SysAllocString
SafeArrayCreateVector
CreateStdAccessibleObject
LresultFromObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ