Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
664c3b3cbcfa9dc0ff0c1ab7e91e260d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
664c3b3cbcfa9dc0ff0c1ab7e91e260d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
664c3b3cbcfa9dc0ff0c1ab7e91e260d_JaffaCakes118
Size
508KB
MD5
664c3b3cbcfa9dc0ff0c1ab7e91e260d
SHA1
cfec75982af926bd84b08a62eed84e63e0e36092
SHA256
48fd2a0514f8ee801b434322477ec7ed7e5ada4ae8f01c19ce281bbdfcfbb93c
SHA512
eb1fe82476babc922486ef74556ebbed0679503208629637140a853c96560d0b2aba8c2389504c2c870e616659c569fb3b18f827c18aeae3745e7fe99c76d6e0
SSDEEP
12288:mM6XFpLh1Pr9hOR9QcIxX/fqc7gvKrsoyr9U:mhXzTD9hORn6/uvyy
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\src\Client\BundleInstall\SmallStandalone\BundleInstall.pdb
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
InternetCloseHandle
InternetReadFile
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetGetConnectedState
HttpQueryInfoA
HttpSendRequestA
ord17
listen
setsockopt
closesocket
shutdown
bind
gethostbyname
htons
socket
accept
send
WSAGetLastError
__WSAFDIsSet
select
recv
WSASetLastError
WSAStartup
ioctlsocket
connect
GetStartupInfoA
GetCurrentProcess
GetSystemDirectoryA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetModuleFileNameA
WideCharToMultiByte
GetSystemTimeAsFileTime
Sleep
CreateDirectoryA
RemoveDirectoryA
SetEvent
OpenEventA
GetVolumeInformationA
GetVersionExA
GetUserDefaultLangID
GetWindowsDirectoryA
SetFileAttributesA
GetFileAttributesA
WriteFile
GetTempPathA
WritePrivateProfileStringA
FreeLibrary
GetProcAddress
LoadLibraryA
WaitForSingleObject
CreateProcessA
lstrcmpiA
ReadFile
CompareFileTime
GetTimeZoneInformation
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
GetLastError
FindClose
FindNextFileA
FindFirstFileA
HeapFree
HeapAlloc
GetProcessHeap
GetLocalTime
OutputDebugStringA
EnterCriticalSection
LeaveCriticalSection
CopyFileA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetEndOfFile
SetConsoleCtrlHandler
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetSystemInfo
VirtualProtect
VirtualQuery
GetOEMCP
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsW
CloseHandle
DeleteFileA
GetTickCount
GetTempFileNameA
GetModuleHandleA
CreateFileA
HeapSize
SetStdHandle
GetFileType
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
FileTimeToLocalFileTime
GetFileInformationByHandle
MoveFileExA
PeekNamedPipe
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
TerminateProcess
HeapReAlloc
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
SetLastError
FindFirstFileW
DeleteFileW
FindNextFileW
LocalFree
LocalAlloc
OpenProcess
WaitForMultipleObjects
ResetEvent
ReleaseMutex
ReleaseSemaphore
CreateEventA
CreateMutexA
OpenMutexA
CreateSemaphoreA
QueryPerformanceFrequency
QueryPerformanceCounter
SystemTimeToFileTime
FileTimeToSystemTime
GetSystemTime
GetDateFormatA
GetTimeFormatA
UnmapViewOfFile
GetComputerNameA
GetCurrentProcessId
MapViewOfFile
CreateFileMappingA
GetVersion
GetShortPathNameA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
FormatMessageA
GetModuleFileNameW
LoadLibraryExA
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFilePointer
InterlockedExchange
MultiByteToWideChar
lstrlenA
ExitProcess
RtlUnwind
RaiseException
FlushFileBuffers
SetFileTime
LocalFileTimeToFileTime
ExitThread
GetCurrentThreadId
CreateThread
GetCommandLineA
LCMapStringA
LCMapStringW
GetCPInfo
FatalAppExitA
TlsAlloc
VirtualFree
DispatchMessageA
GetSystemMetrics
LoadImageA
ExitWindowsEx
SetForegroundWindow
KillTimer
GetClientRect
SetWindowTextA
PostMessageA
SetWindowPos
LoadStringA
PostQuitMessage
GetDesktopWindow
GetWindowRect
MoveWindow
DestroyWindow
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
GetMessageA
TranslateAcceleratorA
TranslateMessage
GetDC
ReleaseDC
LoadMenuA
AllocateAndInitializeSid
EqualSid
FreeSid
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
SetSecurityInfo
SetFileSecurityA
IsValidSid
RegEnumKeyA
RegEnumValueA
GetSidSubAuthorityCount
GetSidSubAuthority
SetTokenInformation
RegEnumKeyExA
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegCreateKeyExA
RegDeleteKeyA
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegSetKeySecurity
RegSaveKeyA
RegFlushKey
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
DuplicateTokenEx
CreateProcessAsUserA
GetTokenInformation
OleInitialize
CoTaskMemFree
StringFromGUID2
OleRun
CoCreateInstance
CreateErrorInfo
VariantClear
VariantInit
SysFreeString
LoadTypeLi
DispGetIDsOfNames
VariantChangeType
SysAllocString
GetErrorInfo
SetErrorInfo
SHCopyKeyA
GetDeviceCaps
SHGetSpecialFolderPathA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ