Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
4b91adf1472d65d562428567ed545a55_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b91adf1472d65d562428567ed545a55_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
4b91adf1472d65d562428567ed545a55_JaffaCakes118
Size
1.1MB
MD5
4b91adf1472d65d562428567ed545a55
SHA1
0e6142557af1446ab843f12fb83e0916e3ca6fe7
SHA256
3ec8283420993ee2087798388d1064f4adf84e37e054c3c041933e627191a63c
SHA512
dfdc4cb2f258b9e6fbe351070fbbcda04113c14fb77b28e0725cd415ed7a6dfee731244b7074cdcab7418bc214896f12c0eda5f82063d96a358f367b7cbca552
SSDEEP
24576:wsVOiEca5y45Sjo3VRFr0UEf1roqYFOFStKuQ9ZcOS83:7xju5SjkRFJCrVJ8tuSe
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrStrA
StrNCatA
StrStrIA
StrToIntA
StrChrA
wnsprintfA
GetLocalTime
GetVersionExA
GetCurrentProcessId
FindResourceA
GetExitCodeProcess
GetTempPathA
GetFileAttributesA
FindFirstFileA
FindClose
FindNextFileA
FreeResource
LoadResource
GlobalLock
GlobalAlloc
SizeofResource
MulDiv
GlobalUnlock
GlobalFree
LockResource
MoveFileExA
MultiByteToWideChar
GetConsoleOutputCP
WriteConsoleA
SetFilePointer
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
InitializeCriticalSectionAndSpinCount
CreateThread
RtlUnwind
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
WideCharToMultiByte
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
InterlockedDecrement
GetCurrentThreadId
SetLastError
LocalFree
LocalAlloc
WritePrivateProfileStringA
GetPrivateProfileStringA
GetCurrentProcess
FreeLibrary
ReadFile
WriteFile
HeapFree
HeapAlloc
GetFileSize
CreateFileA
lstrcpyA
CloseHandle
CreateToolhelp32Snapshot
Process32Next
Process32First
DeleteFileA
CreateMutexA
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetLastError
CreateDirectoryA
lstrlenW
lstrcatA
Sleep
GetWindowsDirectoryA
GetProcessHeap
GetTickCount
lstrcpynA
lstrlenA
lstrcmpA
ExitProcess
WriteConsoleW
SetStdHandle
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
GetStartupInfoA
GetCommandLineA
GetWindowDC
DrawTextA
RedrawWindow
GetWindowTextLengthA
IsDlgButtonChecked
CheckRadioButton
EnableWindow
FillRect
ReleaseDC
GetDlgItem
SetWindowTextA
GetDlgCtrlID
EndPaint
SetCursor
GetKeyState
GetFocus
GetParent
IsWindowEnabled
BeginPaint
GetWindowTextA
SetWindowLongA
InvalidateRect
PostMessageA
UpdateWindow
DestroyWindow
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SetFocus
SendMessageA
IsDialogMessageA
TranslateMessage
MessageBoxA
GetWindowLongA
CreateWindowExA
PeekMessageA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
FindWindowA
ExitWindowsEx
GetDC
CreateDIBitmap
LPtoDP
GetDeviceCaps
DPtoLP
SetMapMode
GetMapMode
SetBkColor
GetStockObject
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
CreateCompatibleDC
GetTextExtentPointA
GetObjectA
TextOutA
SelectObject
AdjustTokenPrivileges
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupPrivilegeValueA
SetNamedSecurityInfoA
RegOpenKeyExA
SetFileSecurityA
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
RegQueryValueExA
OpenProcessToken
RegOpenKeyA
RegCloseKey
RegCreateKeyA
RegSetValueExA
ShellExecuteExA
ShellExecuteA
SHGetFolderPathA
CreateStreamOnHGlobal
OleLoadPicture
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ