Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
417113098f2d1bb5a5ca025554b03163_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
417113098f2d1bb5a5ca025554b03163_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
417113098f2d1bb5a5ca025554b03163_JaffaCakes118
Size
839KB
MD5
417113098f2d1bb5a5ca025554b03163
SHA1
e4e5de2e5a4885ce9ea52ab41de691d4fcee3bcf
SHA256
cd4963912520ed428a041882ee7a8121d95fc342fbf54287068b08c1f49eeeae
SHA512
fd28e2e28809d2e1d80b58401eb118f03a230e0c1109a6c51b6a05d323f92f9cf1fbb49699b5ea7be0be2f7ed5f6a5ef3457789712c6562d592c8302b812bdf6
SSDEEP
24576:jPjgd5+5UwDruaIlAIWMA+ud+uU+uH+uA+ue+u6+uS+uue474TE8u+u6+unwQ9E6:jPjGc5truBlAIWMjPw9gquavee4TE8px
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcessId
ReleaseMutex
CreateMutexA
ReadFile
SetFilePointer
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
SetCurrentDirectoryA
EnumResourceNamesA
CreateThread
GetTickCount
WaitForSingleObject
DeleteFileA
GetModuleHandleA
GetVersion
CreateFileA
WriteFile
CloseHandle
GetSystemDirectoryA
GetVolumeInformationA
GetVersionExA
GetCurrentProcess
lstrcmpA
TerminateThread
SetFileAttributesA
CopyFileA
lstrcpyA
lstrcpynA
CreateDirectoryA
SizeofResource
LockResource
LoadResource
FindResourceA
GetCurrentDirectoryA
CreateFileW
GetTempPathA
LocalFree
LocalAlloc
GetCurrentThread
HeapAlloc
GetProcessHeap
EnumResourceTypesA
SetEvent
CreateEventA
TerminateProcess
LoadLibraryW
CreateProcessA
CreateProcessW
OpenProcess
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
RtlUnwind
HeapFree
HeapReAlloc
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
GetFileAttributesA
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
CompareStringA
CompareStringW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetStdHandle
HeapSize
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetTimeZoneInformation
GetLocaleInfoW
SetEndOfFile
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
lstrcatA
GetModuleFileNameA
lstrlenW
lstrlenA
Sleep
DeleteCriticalSection
InitializeCriticalSection
WideCharToMultiByte
MultiByteToWideChar
SetLastError
GetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
GlobalFree
EndPaint
MessageBoxA
PostMessageA
PostThreadMessageA
GetDesktopWindow
ShowWindow
wvsprintfA
wsprintfA
GetForegroundWindow
GetSystemMetrics
DialogBoxParamA
GetDlgItemTextA
EndDialog
SetFocus
SetDlgItemTextA
SetWindowTextA
LoadIconA
SendMessageA
LoadBitmapA
BeginPaint
GetDlgItem
GetMessageA
BitBlt
CreateCompatibleDC
SelectObject
DeleteDC
DeleteObject
GetObjectA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
FreeSid
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
InitializeSecurityDescriptor
AllocateAndInitializeSid
CloseServiceHandle
OpenSCManagerA
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
RegSetValueExA
LookupAccountNameA
CryptHashData
CryptCreateHash
CryptAcquireContextA
CreateProcessAsUserW
CreateProcessAsUserA
OpenProcessToken
GetTokenInformation
LookupPrivilegeValueA
AdjustTokenPrivileges
ShellExecuteExA
ShellExecuteA
SysAllocStringLen
SysFreeString
SysAllocString
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
CoTaskMemFree
WSAGetLastError
socket
closesocket
inet_addr
WSAIoctl
ntohl
gethostbyname
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ