Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3c0b9c82f0a1c2528f2ee22715ba1d82_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c0b9c82f0a1c2528f2ee22715ba1d82_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
3c0b9c82f0a1c2528f2ee22715ba1d82_JaffaCakes118
Size
2.4MB
MD5
3c0b9c82f0a1c2528f2ee22715ba1d82
SHA1
eda451bf50f825f4c8a15394dc562b46b31834bb
SHA256
d86f2dafdb23212bef7239fa4b54b07eaaee16244ba147f524ff5a3756722c93
SHA512
055c28adb6d51e433dad0fd99ba9a9d3f06ef9b0f161db40942097cde082fb30f3c7a88be4d89705be440d0a3525ddb024b7cebf2f8a814608e59b4897503a09
SSDEEP
49152:wTdh8jgydkZkPyQtx4x6mar14tjz8VnyBA5hPKJHPKJgPKJ5PKJtPKJSPKJxcfZW:FoWPPtxN14tj+cfI
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
PropertySheetA
InitCommonControlsEx
ord17
FormatMessageA
GetEnvironmentVariableA
CreateMutexA
CreateSemaphoreA
CreateEventA
GetSystemInfo
lstrcmpA
WaitForSingleObject
OpenEventA
FindNextChangeNotification
FindCloseChangeNotification
FindFirstChangeNotificationA
GetDriveTypeA
_llseek
ReleaseMutex
GetCurrentThreadId
lstrcmpW
SetEvent
CompareFileTime
WideCharToMultiByte
WinExec
SetCurrentDirectoryA
GetPrivateProfileSectionA
FlushFileBuffers
GetLogicalDrives
GetSystemDefaultLangID
SizeofResource
FileTimeToDosDateTime
FindResourceA
EnumResourceNamesA
EnumResourceTypesA
TerminateProcess
GetCurrentProcessId
ReadProcessMemory
VirtualQueryEx
ExpandEnvironmentStringsA
OpenSemaphoreA
OpenMutexA
CopyFileA
SetPriorityClass
QueryDosDeviceA
GlobalUnlock
GlobalFree
GlobalAlloc
GlobalLock
GetSystemTime
DuplicateHandle
InterlockedExchange
GetVolumeInformationA
VirtualFreeEx
VirtualProtectEx
VirtualAllocEx
SetProcessWorkingSetSize
_lclose
OpenFile
LoadLibraryExA
GetVersion
SetFileTime
CreateDirectoryA
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GlobalMemoryStatus
GetFileInformationByHandle
SystemTimeToFileTime
FileTimeToSystemTime
AreFileApisANSI
lstrcpynA
GetFileTime
GetFileAttributesA
GetVersionExA
GetProcessHeap
HeapFree
HeapAlloc
OpenProcess
GetCurrentThread
GetCurrentProcess
GetLocalTime
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
GetDateFormatA
GetShortPathNameA
SetLastError
GetFileSize
CreateFileMappingA
GetDiskFreeSpaceA
GetTickCount
Sleep
MapViewOfFile
UnmapViewOfFile
OpenFileMappingA
GetTempPathA
GetTempFileNameA
SetFileAttributesA
RemoveDirectoryA
GetLastError
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
ReadFile
InitializeCriticalSection
EnterCriticalSection
lstrcatA
LeaveCriticalSection
lstrlenA
lstrcpyA
SetUnhandledExceptionFilter
GetStringTypeW
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
GetFullPathNameA
GetSystemDirectoryA
DeleteFileA
LocalFree
CloseHandle
DeviceIoControl
PeekNamedPipe
SetEnvironmentVariableW
CreateProcessA
GetExitCodeProcess
GetTimeFormatA
GetTimeZoneInformation
GetWindowsDirectoryA
WriteProfileStringA
GetProfileStringA
GetPrivateProfileStringA
WritePrivateProfileSectionA
WritePrivateProfileStringA
MoveFileExA
SetEndOfFile
GetModuleFileNameA
lstrcmpiA
CreateThread
WaitForSingleObjectEx
TerminateThread
LocalAlloc
MoveFileA
GetThreadLocale
GetCurrentDirectoryA
WriteFile
LoadResource
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
SetStdHandle
UnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
TlsGetValue
TlsAlloc
GetOEMCP
GetACP
GetCPInfo
DeleteCriticalSection
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
RaiseException
GetCommandLineA
GetStartupInfoA
ExitProcess
HeapSize
HeapReAlloc
ExitThread
TlsSetValue
ResumeThread
RtlUnwind
SetEnvironmentVariableA
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetForegroundWindow
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
ExitWindowsEx
GetSystemMetrics
GetClientRect
MoveWindow
FindWindowExA
SetWindowRgn
EnableWindow
IsIconic
EnumWindows
SendMessageTimeoutA
DestroyIcon
SystemParametersInfoA
GetWindowRect
GetCursorPos
RegisterWindowMessageA
PostMessageA
CharLowerA
wsprintfA
GetDesktopWindow
CharUpperA
SetActiveWindow
BringWindowToTop
AttachThreadInput
GetForegroundWindow
GetParent
RedrawWindow
SetCursorPos
LoadImageA
GetUserObjectSecurity
GetDC
ScreenToClient
CreateCursor
DestroyCursor
SetSystemCursor
CloseDesktop
CloseWindowStation
OpenInputDesktop
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationA
GetSysColor
SetPropA
GetPropA
GetDlgItem
CallWindowProcA
SetCursor
LoadCursorA
RemovePropA
DefWindowProcA
ReleaseDC
SendMessageA
FindWindowA
EndPaint
ClientToScreen
BeginPaint
EnumDesktopWindows
OpenDesktopA
EqualRect
GetWindowLongA
PostThreadMessageA
SetFocus
UpdateWindow
SetDlgItemTextA
LoadIconA
SetWindowLongA
GetDlgItemTextA
IsDlgButtonChecked
CheckDlgButton
GetDlgCtrlID
EnumChildWindows
KillTimer
DialogBoxParamA
SendDlgItemMessageA
SetWindowTextA
SetTimer
DeleteMenu
GetSystemMenu
EndDialog
IsWindow
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
DestroyWindow
CreateDialogParamA
ShowWindow
IsWindowVisible
CopyImage
MessageBoxA
GetCapture
CreateRectRgn
SelectObject
CreateFontIndirectA
GetTextFaceA
GetTextMetricsA
SetBkColor
SetTextColor
DeleteObject
GetStockObject
GetTextExtentPoint32A
CreateHalftonePalette
DeleteDC
CreatePalette
GetDIBColorTable
CreateCompatibleDC
GetObjectA
GetDeviceCaps
StretchBlt
BitBlt
RealizePalette
SelectPalette
CreateFontA
CreateSolidBrush
EnumDependentServicesA
GetUserNameA
RegCloseKey
RegSetValueExA
StartServiceA
DeregisterEventSource
RegUnLoadKeyA
RegLoadKeyA
RegCreateKeyA
RegEnumValueA
RegEnumKeyA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
OpenThreadToken
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
UnlockServiceDatabase
QueryServiceLockStatusA
LockServiceDatabase
ChangeServiceConfigA
QueryServiceConfigA
RegDeleteKeyA
QueryServiceStatus
CreateProcessAsUserA
DeleteService
ControlService
IsValidSid
GetSidIdentifierAuthority
ReportEventA
RegisterEventSourceA
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
EqualSid
AllocateAndInitializeSid
LookupAccountSidA
CryptGetHashParam
GetSecurityDescriptorOwner
CreateServiceA
DuplicateToken
DuplicateTokenEx
RevertToSelf
ImpersonateLoggedOnUser
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
LogonUserA
EnumServicesStatusA
SHBrowseForFolderA
ShellExecuteA
Shell_NotifyIconA
SHGetSpecialFolderLocation
SHChangeNotify
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetMalloc
CLSIDFromString
CoTaskMemFree
CoInitializeEx
OleRun
CoCreateGuid
StringFromGUID2
CoUninitialize
CoInitialize
CLSIDFromProgID
CoCreateInstance
GetErrorInfo
VariantTimeToSystemTime
SysStringLen
VariantChangeType
SysAllocString
VariantCopy
VariantInit
SysStringByteLen
SysAllocStringByteLen
VariantClear
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ