Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
46f53d088fece35aa306c0dbdc2aad33_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
46f53d088fece35aa306c0dbdc2aad33_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
46f53d088fece35aa306c0dbdc2aad33_JaffaCakes118
Size
202KB
MD5
46f53d088fece35aa306c0dbdc2aad33
SHA1
e5eb0cad44ffa64745db3c15dfaa15fea9a394c7
SHA256
e1ab4e4fc517390db905feb436ecd43df97bc5c8856e66d2d07606c0b3d53ce6
SHA512
8a4cbdb4aa843d3ff2434a8ffdb79e1dbfe6e98c194fadf6c0d1f24653bdbc3f63badca7da42de2a6c7cd4363d100a2a8fbd149073d9d6fa7cc708e9e4fae210
SSDEEP
3072:c8ipfGRsBS0+lYAbFXH1goGZAaRJHPZJ9JZ6T/vqElD7p8qcbKwZ5o4f:4uRsR+pFtGzdPZ3JKZlHWqXwg+
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ResumeThread
WriteProfileSectionA
QueryInformationJobObject
CreateProcessW
InterlockedFlushSList
Toolhelp32ReadProcessMemory
SetProcessWorkingSetSize
IsBadStringPtrA
GetCurrentThreadId
GetBinaryTypeA
SetConsoleDisplayMode
CreateDirectoryW
LZSeek
GlobalFlags
GetVolumeNameForVolumeMountPointA
SetProcessAffinityMask
SetProcessShutdownParameters
DisconnectNamedPipe
ResetWriteWatch
RemoveLocalAlternateComputerNameW
CreateProcessA
LZCloseFile
GetTempFileNameW
InterlockedPopEntrySList
GetConsoleProcessList
SetThreadPriorityBoost
GetPriorityClass
GetExitCodeThread
GetProfileStringW
DosPathToSessionPathW
CommConfigDialogA
IsValidLanguageGroup
CreateToolhelp32Snapshot
CreateHardLinkA
CallNamedPipeA
SystemTimeToTzSpecificLocalTime
LZDone
ZombifyActCtx
RemoveVectoredExceptionHandler
GetProcAddress
GetProcessWorkingSetSize
GetBinaryType
VerLanguageNameW
AssignProcessToJobObject
VirtualFreeEx
SetTimeZoneInformation
WriteProfileStringA
HeapFree
GetVolumePathNamesForVolumeNameW
ReadConsoleInputA
LocalSize
Thread32Next
GetSystemDefaultLangID
HeapLock
GetConsoleScreenBufferInfo
RegisterWaitForInputIdle
NlsGetCacheUpdateCount
CreateDirectoryA
GenerateConsoleCtrlEvent
BindIoCompletionCallback
TerminateJobObject
SetSystemTimeAdjustment
SetConsoleMenuClose
SetThreadAffinityMask
GetDefaultCommConfigW
GetFileSizeEx
GetPrivateProfileStringW
FindActCtxSectionGuid
ShowWindowAsync
DisableProcessWindowsGhosting
SetSystemCursor
wsprintfW
DispatchMessageA
NotifyWinEvent
CloseWindow
BroadcastSystemMessageA
SetMenuInfo
SetWindowPos
GetWindowRgnBox
MessageBoxIndirectA
MB_GetString
LoadKeyboardLayoutA
GetActiveWindow
CloseDesktop
RegisterSystemThread
RegisterClipboardFormatW
CharPrevExA
ChangeMenuW
CharToOemBuffW
EnumDesktopWindows
SetSysColorsTemp
DdeAddData
TrackPopupMenu
CreateMenu
IsClipboardFormatAvailable
RealGetWindowClassW
IntersectRect
IsDialogMessageW
EndDialog
AppendMenuA
SwitchToThisWindow
ReuseDDElParam
MapVirtualKeyW
ClientThreadSetup
DialogBoxIndirectParamA
SendDlgItemMessageW
LoadMenuA
SetMenuItemInfoW
DestroyCursor
LockWorkStation
BroadcastSystemMessageW
AllowForegroundActivation
GetClassInfoExW
GetInputDesktop
EnumWindowStationsA
GetShellWindow
SetEntriesInAclW
SetPrivateObjectSecurityEx
GetSecurityDescriptorControl
CredDeleteA
GetTrusteeNameA
SystemFunction040
GetMultipleTrusteeA
InitializeSecurityDescriptor
ClearEventLogA
LsaOpenAccount
GetTrusteeFormA
CommandLineFromMsiDescriptor
CryptDestroyKey
CreateWellKnownSid
LsaOpenTrustedDomain
GetManagedApplications
SystemFunction011
LsaStorePrivateData
AddAccessDeniedObjectAce
LsaEnumerateAccounts
QueryAllTracesW
CryptCreateHash
RegOpenKeyExA
GetManagedApplicationCategories
A_SHAUpdate
ControlService
RegOpenKeyA
SHPathPrepareForWriteW
SHQueryRecycleBinW
DllGetClassObject
StrChrIA
SHGetIconOverlayIndexA
ExtractAssociatedIconA
SHGetFolderPathAndSubDirW
ExtractAssociatedIconW
SHHelpShortcuts_RunDLLW
SHCreateLocalServerRunDll
ShellExecuteExA
PathIsRelativeA
PathMakePrettyA
ImageList_DrawIndirect
CreateToolbarEx
FlatSB_SetScrollRange
CreateUpDownControl
VarR4FromI4
VarI2FromBool
CreateErrorInfo
VarCyFromDec
VarBstrFromUI4
OleCreateFontIndirect
InternetAttemptConnect
FindNextUrlCacheEntryExA
DeleteUrlCacheGroup
GetUrlCacheGroupAttributeW
SetUrlCacheConfigInfoA
InternetSetPerSiteCookieDecisionA
GopherCreateLocatorA
InternetSetOptionW
InternetSetDialState
InternetSetOptionExW
FtpRenameFileW
GetUrlCacheHeaderData
InternetAutodialHangup
FtpFindFirstFileW
InternetEnumPerSiteCookieDecisionW
CoInternetGetSession
URLDownloadToFileW
RevokeFormatEnumerator
CDLGetLongPathNameA
FaultInIEFeature
ObtainUserAgentString
URLOpenStreamW
IsLoggingEnabledW
CreateFormatEnumerator
AddMonitorW
DeletePortW
GetPrinterW
StartPagePrinter
StartDocPrinterA
DeletePrinterDriverExW
GetNameByTypeA
GetAddressByNameA
__WSAFDIsSet
WSAAsyncGetProtoByName
send
htons
socket
TransmitFile
listen
ntohs
WSARecvEx
CertSetEnhancedKeyUsage
CertFreeCRLContext
CertSerializeCTLStoreElement
I_CertUpdateStore
CertAddCTLContextToStore
CryptSetAsyncParam
CryptBinaryToStringA
PFXImportCertStore
CryptFindCertificateKeyProvInfo
I_CryptDetachTls
CryptImportPublicKeyInfoEx
CertCreateCertificateChainEngine
D3DFree
D3DRealloc
PaletteUpdateNotify
_strcmpi
_CItan
_write
_ftol
wcspbrk
puts
pow
strpbrk
UpdatePerfNameFilesA
UnloadPerfCounterTextStringsW
?SetAt@CMapStringToPtr@@QAEXPBGPAX@Z
?GetHashTableSize@CMapStringToPtr@@QBEIXZ
?TrimRight@CString@@QAEXXZ
??1CObject@@UAE@XZ
?GetCount@CMapStringToPtr@@QBEHXZ
?SetAt@CString@@QAEXHG@Z
?GetAssocAt@CMapStringToPtr@@IBEPAUCAssoc@1@PBGAAI@Z
?Format@CString@@QAAXIZZ
??9@YG_NPBGABVCString@@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ