Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
488a6f2571ee8ba4257e34753a40a49f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
488a6f2571ee8ba4257e34753a40a49f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
488a6f2571ee8ba4257e34753a40a49f_JaffaCakes118
Size
1.3MB
MD5
488a6f2571ee8ba4257e34753a40a49f
SHA1
fdf628b4331d7a913a4267b6de07564ebd41cb1f
SHA256
c5e666ead737a21f23ad195e693ba9d39fb641969183787886a80c6996a8aa58
SHA512
102c0c7dbc08c05ea832f44e58ab3030e1727a6d7d28a7316591775ba233937cbc9d7336a7ee6b0387580222bd455b2031c24638515167e4520fbb12432cb277
SSDEEP
24576:CONdx3rh4F0LkIhumw6jp2yvLfEslkFJGibd/r4BZwLUu9yQg400D3yYdSDhzEMY:CY3WIXIG2yTEsl/imBZcUu9yKRGYYVRE
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrChrA
PathFileExistsA
StrToIntA
StrStrIA
StrStrA
wnsprintfA
StrNCatA
UuidToStringA
UuidCreate
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetComputerNameA
GetVolumeInformationA
Sleep
CreateThread
GetLocalTime
GetVersionExA
lstrcpyA
GetTickCount
GetCurrentProcessId
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
MoveFileExA
GetExitCodeProcess
lstrcatA
lstrcmpiA
GetModuleFileNameA
WinExec
GetTempPathA
GetFileAttributesA
FindFirstFileA
FindClose
FindNextFileA
GetModuleHandleA
GetFileSize
CreateProcessA
ReadFile
CreateDirectoryA
ExitProcess
OpenMutexA
CreateMutexA
MultiByteToWideChar
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetFullPathNameA
DosDateTimeToFileTime
SetFileTime
GetFileTime
LocalFileTimeToFileTime
InterlockedDecrement
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
lstrlenA
DeleteCriticalSection
VirtualFree
HeapCreate
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
GetFileType
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
lstrcpynA
MapViewOfFile
DeleteFileA
LoadLibraryA
GetConsoleCP
GetConsoleMode
SetFilePointer
GetLocaleInfoA
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
GetProcAddress
GetCurrentProcess
FreeLibrary
WriteFile
CreateFileA
GetProcessHeap
HeapFree
HeapAlloc
OpenFileMappingA
CloseHandle
CreateToolhelp32Snapshot
CreateFileMappingA
Process32Next
GetLastError
WideCharToMultiByte
VirtualAlloc
Process32First
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
HeapSize
GetStringTypeA
GetStringTypeW
RedrawWindow
GetWindowTextLengthA
IsDlgButtonChecked
CheckRadioButton
FillRect
GetDlgItem
SetWindowTextA
FindWindowA
GetWindowDC
DrawFocusRect
GetDlgCtrlID
SetCursor
SetFocus
EndPaint
GetKeyState
GetFocus
LoadBitmapA
GetParent
IsWindowEnabled
BeginPaint
GetDC
DrawTextA
SetWindowLongA
InvalidateRect
ReleaseDC
PostMessageA
UpdateWindow
DestroyWindow
keybd_event
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SendMessageA
IsDialogMessageA
TranslateMessage
MapVirtualKeyA
MessageBoxA
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
PeekMessageA
MoveWindow
ExitWindowsEx
GetWindowThreadProcessId
EnumWindows
GetClassNameA
GetWindowTextA
EnableWindow
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SetBkColor
CreateCompatibleDC
GetTextExtentPointA
GetObjectA
GetStockObject
TextOutA
SelectObject
CreateDIBitmap
AdjustTokenPrivileges
SetFileSecurityA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
OpenProcessToken
OpenSCManagerA
QueryServiceStatus
CloseServiceHandle
OpenServiceA
RegOpenKeyExA
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
RegEnumKeyA
LookupPrivilegeValueA
SetSecurityDescriptorDacl
RegSetValueExA
RegDeleteKeyA
SetEntriesInAclA
InitializeSecurityDescriptor
RegOpenKeyA
ShellExecuteExA
SHGetFolderPathA
ShellExecuteA
CoTaskMemAlloc
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ