Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
63bded5cb6ca7a3161c8b14e12d63f9e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63bded5cb6ca7a3161c8b14e12d63f9e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
63bded5cb6ca7a3161c8b14e12d63f9e_JaffaCakes118
Size
606KB
MD5
63bded5cb6ca7a3161c8b14e12d63f9e
SHA1
104adf7bc02220c8759e20029e7e35b0476c5e03
SHA256
f47018e1464e0a6a25267d58b4aebcdc2bf925c2dbaad5163cc45e16408d8c7d
SHA512
9fa18b94642034121a864804598e0759c0c46981bd2c781da8c067b1e95bd7fe56183e6b47d7e1019be8174e7b8d42ca7cfe987d7130495681825376609de99d
SSDEEP
12288:JNKWXoSd1WAH/ldy6sjCRe3TSjDjl47DfaI/WsG:JFX7Hance3TSj3lQDfaIWj
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\tfs.vs2010.win7\nonelevated\windows\main\Installer.FreezeWrapStub.Application\Release\FreezeWrapStub.pdb
ExpandEnvironmentStringsForUserA
EnumProcesses
GetModuleFileNameExA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
InternetCrackUrlA
InternetCombineUrlA
InternetGetCookieA
InternetSetCookieA
InternetCloseHandle
InternetOpenA
InternetSetStatusCallback
InternetSetOptionA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
HttpQueryInfoA
InternetErrorDlg
InternetReadFileExA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpA
InterlockedExchange
GetLocaleInfoA
ConvertDefaultLocale
GetCurrentThread
SetThreadPriority
SetEvent
SuspendThread
CreateEventA
GetModuleHandleW
InterlockedIncrement
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
FlushFileBuffers
CompareStringA
SetEndOfFile
SetErrorMode
GetCommandLineA
GetStartupInfoA
GetTimeFormatA
GetDateFormatA
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
ExitProcess
ExitThread
CreateThread
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
lstrcmpW
FreeResource
InterlockedDecrement
GetModuleFileNameW
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
WaitForMultipleObjects
GetTimeZoneInformation
FileTimeToSystemTime
SystemTimeToFileTime
SetFilePointer
WriteFile
ReadFile
GetFileSize
CreateFileA
ResumeThread
GetLongPathNameA
GetModuleFileNameA
MoveFileA
GetFileAttributesA
CopyFileA
RemoveDirectoryA
DeleteFileA
GetSystemTime
CreateDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetCurrentProcessId
Module32Next
Module32First
TerminateProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateProcessA
ExpandEnvironmentStringsA
GetSystemDirectoryA
GetWindowsDirectoryA
GetSystemInfo
GetVersionExA
GetTempPathA
CloseHandle
GetProcAddress
GetExitCodeProcess
OpenProcess
WaitForSingleObject
GetCurrentProcess
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetCurrentThreadId
GetLocalTime
GetUserDefaultUILanguage
FindResourceExA
LoadLibraryExA
FreeLibrary
EnumResourceLanguagesA
EnumResourceNamesA
LoadLibraryA
EndUpdateResourceA
HeapFree
UpdateResourceA
GetProcessHeap
HeapAlloc
BeginUpdateResourceA
LocalFree
lstrlenA
LocalAlloc
GetModuleHandleA
FormatMessageA
SetFileAttributesA
GetTickCount
CreateMutexA
ReleaseMutex
Sleep
GetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
ResetEvent
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnregisterClassA
LoadCursorA
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
ShowWindow
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
IsIconic
GetWindowPlacement
GetWindow
ReleaseDC
GetDC
GetClientRect
CopyRect
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetNextDlgTabItem
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowRect
GetDesktopWindow
FindWindowA
EnumChildWindows
GetClassNameA
SetForegroundWindow
IsWindowEnabled
EnumWindows
SystemParametersInfoA
GetSystemMetrics
GetWindowThreadProcessId
GetShellWindow
LoadStringA
LoadIconA
SetTimer
PostMessageA
MessageBoxA
WaitForInputIdle
MessageBoxExA
RedrawWindow
KillTimer
IsWindowVisible
UpdateWindow
EnableWindow
SendMessageA
IsWindow
GetDlgItem
SetWindowTextA
SetWindowLongA
EndDialog
GetSysColorBrush
GetSysColor
GetDlgCtrlID
GetWindowLongA
DialogBoxParamA
DestroyMenu
CreateWindowExA
PtInRect
DeleteDC
GetStockObject
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
ScaleWindowExtEx
SetWindowExtEx
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetTextColor
ScaleViewportExtEx
GetClipBox
GetDeviceCaps
SetBkColor
TextOutA
RectVisible
PtVisible
DeleteObject
SetViewportExtEx
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RevertToSelf
RegOpenUserClassesRoot
RegOpenCurrentUser
AdjustTokenPrivileges
GetLengthSid
ImpersonateLoggedOnUser
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
CreateProcessAsUserA
ShellExecuteExA
SHGetSpecialFolderPathA
InitCommonControlsEx
PathCombineA
PathFindExtensionA
PathStripPathA
PathRemoveFileSpecA
SHDeleteEmptyKeyA
UrlEscapeA
PathFindFileNameA
PathRenameExtensionA
CoCreateInstance
CoCreateGuid
StringFromGUID2
OleUninitialize
OleInitialize
CoTaskMemAlloc
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SafeArrayDestroy
SysFreeString
SysAllocString
SafeArrayCreateVector
CreateStdAccessibleObject
LresultFromObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ