Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
622e387d57a874309df2abcee0d4768d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
622e387d57a874309df2abcee0d4768d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
622e387d57a874309df2abcee0d4768d_JaffaCakes118
Size
991KB
MD5
622e387d57a874309df2abcee0d4768d
SHA1
1c7f10fa74d8b7664a7e1325a5c47ac9d71e1d3c
SHA256
7dd5f6a8f867f8ac3dd10b090522380956d2e59bddf7717d7f5c747840a58743
SHA512
0973ee5effa2b6aa8ccc326b44ed3372e1f906ec0a9854b0be5a653a3855c7be43129e2db9c120f9effca7c8377c7cd564cfe0bbc39a28205a6aa0e6005e246f
SSDEEP
24576:K49RAJ2oASZoKFXmqq8L2JtO+BvIREHimfRkjzOmatC2:VYJ2oASZoKtx2JtOUgREC8kPOma
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProfilesDirectoryA
PathFileExistsA
StrNCatA
wnsprintfA
StrStrA
StrStrIA
StrToIntA
StrChrA
AssocQueryStringA
LoadLibraryA
LoadLibraryExA
DeleteFileA
CreateThread
GetLocalTime
GetVersionExA
MoveFileExA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetTempPathA
FindResourceA
LoadResource
InterlockedIncrement
InterlockedDecrement
GlobalLock
InitializeCriticalSection
SizeofResource
LeaveCriticalSection
MulDiv
IsDBCSLeadByte
MultiByteToWideChar
GlobalUnlock
FlushInstructionCache
RaiseException
SetLastError
EnterCriticalSection
GetModuleHandleA
DeleteCriticalSection
GetCurrentThreadId
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
OpenMutexA
GetComputerNameA
GetVolumeInformationA
GetTickCount
FreeResource
LockResource
GetFullPathNameA
DosDateTimeToFileTime
SetFileTime
GetFileTime
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
lstrlenA
SetHandleCount
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetStdHandle
VirtualFree
HeapCreate
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
HeapSize
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetCommandLineA
GetConsoleMode
GetConsoleCP
GetFileType
HeapReAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
CreateFileA
lstrcmpiA
lstrlenW
WideCharToMultiByte
LocalFree
CloseHandle
GlobalFree
GetLastError
GlobalAlloc
OpenProcess
ExpandEnvironmentStringsA
GetProcessHeap
HeapFree
GetCurrentProcess
FlushFileBuffers
RtlUnwind
HeapAlloc
GetLocaleInfoA
InterlockedCompareExchange
IsProcessorFeaturePresent
lstrcmpA
CreateProcessA
lstrcpynA
SetStdHandle
SetEndOfFile
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
WaitForSingleObject
FreeLibrary
ReadFile
SetFilePointer
GetFileSize
lstrcpyA
CreateToolhelp32Snapshot
CreateMutexA
FindNextFileA
GetModuleFileNameA
Process32Next
FindClose
FindFirstFileA
lstrcatA
TerminateProcess
GetExitCodeProcess
GetFileAttributesA
Sleep
WriteFile
SleepEx
Process32First
ExitProcess
WritePrivateProfileStringA
GetPrivateProfileStringA
IsValidCodePage
CreateDirectoryA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetClassInfoExA
SetCapture
CharNextA
RegisterWindowMessageA
CreateAcceleratorTableA
UnregisterClassA
RedrawWindow
GetDesktopWindow
GetSysColorBrush
IsWindow
ReleaseCapture
CallWindowProcA
GetWindow
MoveWindow
DrawTextA
InvalidateRgn
DrawEdge
GetWindowTextLengthA
IsDlgButtonChecked
CheckRadioButton
EnableWindow
FillRect
GetDlgItem
SetWindowTextA
GetDlgCtrlID
EndPaint
GetKeyState
GetFocus
LoadBitmapA
IsChild
MessageBeep
IsWindowEnabled
BeginPaint
GetDC
GetWindowTextA
SetWindowLongA
InvalidateRect
ReleaseDC
PostMessageA
UpdateWindow
DestroyWindow
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SetFocus
SendMessageA
IsDialogMessageA
TranslateMessage
GetWindowLongA
CreateWindowExA
PeekMessageA
DefWindowProcA
SetWindowPos
DispatchMessageA
SystemParametersInfoA
LoadCursorA
MessageBoxA
ShowWindow
GetUserObjectSecurity
GetWindowThreadProcessId
GetShellWindow
ScreenToClient
DestroyAcceleratorTable
GetClassNameA
ClientToScreen
DrawFocusRect
GetWindowDC
SetCursor
ExitWindowsEx
GetParent
GetSysColor
DPtoLP
SetMapMode
GetMapMode
CreateDIBitmap
GetDeviceCaps
CreateCompatibleBitmap
CreateRectRgn
SetBkColor
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
GetTextExtentPointA
GetObjectA
GetStockObject
TextOutA
LPtoDP
OpenServiceA
RegEnumKeyA
ConvertSidToStringSidA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
CloseServiceHandle
QueryServiceStatus
OpenSCManagerA
LookupAccountNameA
LookupAccountSidA
LookupPrivilegeValueA
GetSecurityDescriptorOwner
IsValidSid
GetUserNameA
RegOpenKeyA
AdjustTokenPrivileges
RegSetValueExA
RegDeleteKeyA
RegCreateKeyA
RegDeleteValueA
RegEnumKeyExA
RegCreateKeyExA
RegQueryInfoKeyA
GetTokenInformation
ord680
ShellExecuteA
SHGetFolderPathA
ShellExecuteExA
CoTaskMemAlloc
CoGetClassObject
CoTaskMemFree
OleUninitialize
StringFromGUID2
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoTaskMemRealloc
OleLockRunning
CoCreateInstance
OleInitialize
SysFreeString
SysAllocString
SysStringLen
VariantClear
LoadTypeLi
VariantInit
SysAllocStringLen
OleCreateFontIndirect
VarUI4FromStr
LoadRegTypeLi
OleLoadPicture
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ