Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
3d35bd1b21a27f55a1a741e14e100aab_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3d35bd1b21a27f55a1a741e14e100aab_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
3d35bd1b21a27f55a1a741e14e100aab_JaffaCakes118
Size
608KB
MD5
3d35bd1b21a27f55a1a741e14e100aab
SHA1
d9ae03efb8cd55ffcb9840c3cdc8b304de467f4d
SHA256
17f031e4af907858cce223f7880989915e10ca030fe9ea9f87fcf171f997b7ed
SHA512
1a39bdc9d3d1602c33a80f3523ce9d4716fc39e88b14c44e2493fc231a1b3e1117a06cece6e863266924dbe1b6ffd4d33a6a15c10cc1365a2716a0932effcd8a
SSDEEP
12288:Fmb1cDGUZ+jP+SICaQSH8LT9EshGfpy996kU/r:Fmb50SIMYshIE996kUz
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\tfs.vs2010.win7\nonelevated\windows\main\Installer.FreezeWrapStub.Application\Release\FreezeWrapStub.pdb
ExpandEnvironmentStringsForUserA
EnumProcesses
GetModuleFileNameExA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
InternetCrackUrlA
InternetCombineUrlA
InternetGetCookieA
InternetSetCookieA
InternetCloseHandle
InternetOpenA
InternetSetStatusCallback
InternetSetOptionA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
HttpQueryInfoA
InternetErrorDlg
InternetReadFileExA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpA
InterlockedExchange
GetLocaleInfoA
ConvertDefaultLocale
GetCurrentThread
SetThreadPriority
SetEvent
SuspendThread
CreateEventA
GetModuleHandleW
InterlockedIncrement
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
FlushFileBuffers
CompareStringA
SetEndOfFile
SetErrorMode
GetCommandLineA
GetStartupInfoA
GetTimeFormatA
GetDateFormatA
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
ExitProcess
ExitThread
CreateThread
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
lstrcmpW
FreeResource
InterlockedDecrement
GetModuleFileNameW
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
WaitForMultipleObjects
GetTimeZoneInformation
FileTimeToSystemTime
SystemTimeToFileTime
SetFilePointer
WriteFile
ReadFile
GetFileSize
CreateFileA
ResumeThread
GetLongPathNameA
GetModuleFileNameA
MoveFileA
GetFileAttributesA
CopyFileA
RemoveDirectoryA
DeleteFileA
GetSystemTime
CreateDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetCurrentProcessId
Module32Next
Module32First
TerminateProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateProcessA
ExpandEnvironmentStringsA
GetSystemDirectoryA
GetWindowsDirectoryA
GetSystemInfo
GetVersionExA
GetTempPathA
CloseHandle
GetProcAddress
GetExitCodeProcess
OpenProcess
WaitForSingleObject
GetCurrentProcess
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetCurrentThreadId
GetLocalTime
GetUserDefaultUILanguage
FindResourceExA
LoadLibraryExA
FreeLibrary
EnumResourceLanguagesA
EnumResourceNamesA
LoadLibraryA
EndUpdateResourceA
HeapFree
UpdateResourceA
GetProcessHeap
HeapAlloc
BeginUpdateResourceA
LocalFree
lstrlenA
LocalAlloc
GetModuleHandleA
FormatMessageA
SetFileAttributesA
GetTickCount
CreateMutexA
ReleaseMutex
Sleep
GetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
ResetEvent
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnregisterClassA
LoadCursorA
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
ShowWindow
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
IsIconic
GetWindowPlacement
GetWindow
ReleaseDC
GetDC
GetClientRect
CopyRect
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetNextDlgTabItem
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowRect
GetDesktopWindow
FindWindowA
EnumChildWindows
GetClassNameA
SetForegroundWindow
IsWindowEnabled
EnumWindows
SystemParametersInfoA
GetSystemMetrics
GetWindowThreadProcessId
GetShellWindow
LoadStringA
LoadIconA
SetTimer
PostMessageA
MessageBoxA
WaitForInputIdle
MessageBoxExA
RedrawWindow
KillTimer
IsWindowVisible
UpdateWindow
EnableWindow
SendMessageA
IsWindow
GetDlgItem
SetWindowTextA
SetWindowLongA
EndDialog
GetSysColorBrush
GetSysColor
GetDlgCtrlID
GetWindowLongA
DialogBoxParamA
DestroyMenu
CreateWindowExA
PtInRect
DeleteDC
GetStockObject
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
ScaleWindowExtEx
SetWindowExtEx
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetTextColor
ScaleViewportExtEx
GetClipBox
GetDeviceCaps
SetBkColor
TextOutA
RectVisible
PtVisible
DeleteObject
SetViewportExtEx
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RevertToSelf
RegOpenUserClassesRoot
RegOpenCurrentUser
AdjustTokenPrivileges
GetLengthSid
ImpersonateLoggedOnUser
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
CreateProcessAsUserA
ShellExecuteExA
SHGetSpecialFolderPathA
InitCommonControlsEx
PathCombineA
PathFindExtensionA
PathStripPathA
PathRemoveFileSpecA
SHDeleteEmptyKeyA
UrlEscapeA
PathFindFileNameA
PathRenameExtensionA
CoCreateInstance
CoCreateGuid
StringFromGUID2
OleUninitialize
OleInitialize
CoTaskMemAlloc
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SafeArrayDestroy
SysFreeString
SysAllocString
SafeArrayCreateVector
CreateStdAccessibleObject
LresultFromObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ