Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
47ff2c5557e30b370d935e0c3d81b1b1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
47ff2c5557e30b370d935e0c3d81b1b1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
47ff2c5557e30b370d935e0c3d81b1b1_JaffaCakes118
Size
136KB
MD5
47ff2c5557e30b370d935e0c3d81b1b1
SHA1
88eb81c3d1a2eee9a7bc9f9588809d1609424b59
SHA256
97031c023a47f7958f94f420de8c148eb303f6771da4c3e58ed1378463b7f332
SHA512
f60859870fc8fe800c35c2e6151b919512f3df995b5b48b4642f3b3356a25e434b5cbbe24c3f4bce8bb6cfe9a2aafa7c28e0e49ef9b188bd4248498109735329
SSDEEP
3072:a/0IM09UemDMvi9Ba21IhklMOOHHkoB4vq5kzaJ8Fi:a/0i9UemDwi9BaHkihHHkoB4eai
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\setup.202\ltsetup\objfre_w2k_x86\i386\setup.pdb
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyA
CloseServiceHandle
QueryServiceStatus
OpenServiceA
OpenSCManagerA
lstrcpyA
CloseHandle
GetProcAddress
LoadLibraryA
MoveFileExA
MoveFileA
CreateFileA
GetPrivateProfileStringA
lstrlenA
FindNextFileA
SetFileAttributesA
CopyFileA
FindFirstFileA
GetCurrentProcess
lstrcpynA
CreateDirectoryA
Sleep
RemoveDirectoryA
WriteFile
GetLocalTime
GlobalFree
GlobalAlloc
FindClose
FreeLibrary
GetLastError
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
SetCurrentDirectoryA
SearchPathA
GetDriveTypeA
GetPrivateProfileIntA
GetShortPathNameA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
lstrcatA
DeleteFileA
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
SetUnhandledExceptionFilter
GetStockObject
GetMessageA
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadStringA
LoadIconA
EndDialog
IsDialogMessageA
ExitWindowsEx
KillTimer
wsprintfA
FindWindowA
MessageBoxA
UpdateWindow
ShowWindow
DestroyWindow
TranslateMessage
DispatchMessageA
CreateDialogParamA
SetTimer
DefWindowProcA
PostQuitMessage
DialogBoxParamA
GetDlgItem
SendMessageA
BringWindowToTop
_spawnl
__getmainargs
_cexit
_exit
memcpy
_ismbblead
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
memset
malloc
_spawnv
fopen
fgetc
_access
fclose
atoi
_itoa
mbstowcs
_getcwd
strtok
_mbsupr
_mbsinc
_mbsicmp
_mbstok
_mbsstr
_mbschr
_XcptFilter
_mbscmp
RtlUnwind
SetupDiCallClassInstaller
SetupDiGetDeviceRegistryPropertyA
SetupDiOpenDevRegKey
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiDeleteDeviceInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE