Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
696fe88f2f87ce540055dd6003e0961b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
696fe88f2f87ce540055dd6003e0961b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
696fe88f2f87ce540055dd6003e0961b_JaffaCakes118
Size
1.3MB
MD5
696fe88f2f87ce540055dd6003e0961b
SHA1
d30e326727942643fdc0f2774e708a5de960d08d
SHA256
576a49ca452131fb0fdf8c135f6ab347bada4c7b19d64c0cbdca7286ad6227e6
SHA512
b9ddf6c9224d405363b7559ac5fafd96d1b18fc8c108255b582c8c9c3f7d039727c6d4be28c9686ac7bad6c57ada6857cc2270a396139d0196f668d61382245c
SSDEEP
24576:29JvMAXHhCeMbRJ6b2obT2gNpaLeRdBzdQa1hweMWymmSqvh1DF:oac2obT2Pi/91hhepJhr
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\monkey\Heroes.MainBranch.Updater\BFH_MainBranch\Code\Tools\Updater\Updater\Release\BFHUpdater.pdb
InternetOpenA
InternetCrackUrlA
InternetSetCookieA
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
HttpAddRequestHeadersA
InternetSetOptionA
HttpSendRequestA
InternetConnectA
HttpOpenRequestA
GdipDeleteGraphics
GdipDeletePrivateFontCollection
GdipNewPrivateFontCollection
GdipCreateFromHDC
GdipCloneBrush
GdipDeleteFont
GdipCreateFont
GdipDeleteBrush
GdipGetFontCollectionFamilyList
GdipCloneFontFamily
GdipDeleteFontFamily
GdipCreateBitmapFromStream
GdipGetFontCollectionFamilyCount
GdipGetImageWidth
GdipPrivateAddMemoryFont
GdipDrawString
GdipCreateSolidFill
GdipSetTextRenderingHint
GdipCloneImage
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipFree
GdipAlloc
GdiplusStartup
GdipDrawImageRectI
GdipSetInterpolationMode
GdipDisposeImage
GdipGetImageHeight
HeapCreate
HeapDestroy
SetLastError
ExitProcess
GetStringTypeW
GetStringTypeA
GetCPInfo
LCMapStringW
LCMapStringA
CreateMutexA
WaitForSingleObject
ReleaseMutex
CloseHandle
WideCharToMultiByte
lstrlenW
InterlockedExchange
lstrlenA
GetLastError
MultiByteToWideChar
FindResourceA
SizeofResource
LockResource
LoadResource
CreateFileA
SetFilePointerEx
GetFileSizeEx
ReadFile
WriteFile
GetModuleFileNameA
GetTickCount
CopyFileExA
CreateEventA
CreateThread
SetEvent
WaitForMultipleObjects
DeleteFileA
SetFilePointer
GetLocalTime
GetTempPathA
TerminateThread
CreateWaitableTimerA
SetWaitableTimer
RemoveDirectoryA
VirtualFree
FindClose
FindNextFileA
FindFirstFileA
MoveFileA
GetCurrentProcess
GetVersionExA
GetDiskFreeSpaceExA
GlobalFree
GlobalAlloc
GetModuleHandleA
Sleep
GetCommandLineA
CreateProcessA
GetTempFileNameA
TerminateProcess
LocalAlloc
GetExitCodeProcess
LocalFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GlobalLock
GlobalUnlock
ResetEvent
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
HeapReAlloc
HeapFree
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
HeapAlloc
InitializeCriticalSection
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
VirtualAlloc
GetProcAddress
GetSystemTimeAsFileTime
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
GetStdHandle
SetHandleCount
GetFileType
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileW
SetEndOfFile
MoveFileExA
SetLayeredWindowAttributes
CreateWindowExW
RegisterClassExW
LoadIconA
CreateIconFromResource
GetWindowRect
SetCursor
PtInRect
ReleaseCapture
EndDialog
EndPaint
DrawEdge
SetWindowRgn
SetWindowTextA
GetDlgItem
SetWindowTextW
DefWindowProcW
PostThreadMessageA
GetMessageA
GetSystemMetrics
SetWindowPos
PostQuitMessage
DispatchMessageA
SetCapture
InvalidateRect
DialogBoxParamW
GetWindowLongA
SetWindowLongA
UnregisterClassA
DestroyWindow
UpdateWindow
MoveWindow
DefWindowProcA
GetDlgCtrlID
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetClassNameA
EnumChildWindows
BeginPaint
ShowWindow
GetClientRect
CreateWindowExA
RegisterClassExA
LoadCursorA
ReleaseDC
GetDC
GetTopWindow
SendMessageA
MessageBoxW
MessageBoxA
GetWindow
SelectClipRgn
CreateRectRgn
CreateRoundRectRgn
CreateDCA
GetTextFaceA
SelectObject
DeleteDC
CreateFontIndirectA
EnumFontFamiliesExA
DeleteObject
GetObjectA
RegOpenKeyExA
CreateWellKnownSid
BuildExplicitAccessWithNameA
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
SetNamedSecurityInfoA
SetEntriesInAclA
RegDeleteKeyA
RegDeleteValueA
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
GetUserNameA
SHGetFolderPathA
ShellExecuteA
SHFileOperationA
ShellExecuteExA
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFolderLocation
SHParseDisplayName
SHCreateDirectoryExA
OleInitialize
OleUninitialize
OleCreate
OleSetContainedObject
CreateStreamOnHGlobal
CoTaskMemFree
CoCreateInstance
SysAllocString
VariantClear
SHGetValueA
PathFileExistsA
PathIsRelativeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ