Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
671140fca4d209ffcbbfd42bf51c5bfb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
671140fca4d209ffcbbfd42bf51c5bfb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
671140fca4d209ffcbbfd42bf51c5bfb_JaffaCakes118
Size
128KB
MD5
671140fca4d209ffcbbfd42bf51c5bfb
SHA1
a0b7b068fcde87075e13111708e554016041c59d
SHA256
d0dfc8d871c896bf395991e637a4be05c8e2764edd14fa554d0ce144b05504f5
SHA512
065392ef165dced7ef814a1f038083358d146094b03fe3702751ffe9e08b46b9eba7800d28c450d279cc8eb0825ad6bd1446bfe7fb58a97609e62e674e6652cd
SSDEEP
3072:brvpZ8hCoDfrukRiwqNKJiupCot0xv2BW:brvYhCozrcgCv2I
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapSize
GetACP
HeapReAlloc
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
RaiseException
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
ExitProcess
GetStartupInfoA
HeapAlloc
HeapFree
RtlUnwind
FlushFileBuffers
GetOEMCP
GetCPInfo
GlobalFlags
MulDiv
GetProcessVersion
FreeLibrary
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcmpA
lstrcpynA
SetLastError
GetTickCount
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
GetCurrentThread
GetCommandLineA
lstrcmpiA
CreateEventA
CreateThread
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
FindFirstFileA
lstrcatA
FindNextFileA
FindClose
LoadLibraryA
GetProcAddress
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
GetModuleHandleA
FindResourceA
LoadResource
LockResource
GetVersion
GetLogicalDriveStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
CreateDirectoryA
GetFileAttributesA
GetLastError
SetFileAttributesA
GetSystemDirectoryA
Sleep
DeviceIoControl
SetFilePointer
ReadFile
GetVersionExA
GetCurrentProcess
GetModuleFileNameA
lstrcpyA
lstrlenA
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateFileA
WriteFile
CloseHandle
DeleteFileA
OutputDebugStringA
SetHandleCount
LoadIconA
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
SetActiveWindow
IsWindow
SetFocus
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetForegroundWindow
SetForegroundWindow
wsprintfA
CharNextA
PostThreadMessageA
DispatchMessageA
GetMessageA
IsDialogMessageA
SetWindowTextA
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
GetActiveWindow
SendMessageA
GetKeyState
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
RegisterClipboardFormatA
PeekMessageA
SetTimer
TranslateMessage
KillTimer
MessageBoxA
LoadStringA
ShowWindow
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GrayStringA
DrawTextA
TabbedTextOutA
DestroyMenu
EndDialog
CreateDialogIndirectParamA
ClientToScreen
PtInRect
GetClassNameA
PostQuitMessage
GetMessagePos
GetSysColor
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegisterEventSourceA
OpenProcessToken
CloseServiceHandle
DeleteService
QueryServiceStatus
OpenThreadToken
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
GetLengthSid
CopySid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
StartServiceCtrlDispatcherA
RegDeleteValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
ReportEventA
DeregisterEventSource
RegEnumKeyA
RegQueryValueExA
RegCloseKey
GetTokenInformation
LookupAccountSidA
CreateProcessAsUserA
RegOpenKeyA
RegSetValueExA
CreateServiceA
StartServiceA
OpenSCManagerA
OpenServiceA
ControlService
ShellExecuteA
ord17
ord8
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoInitialize
CoInitializeSecurity
CoUninitialize
CoRevokeClassObject
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenA
InternetOpenUrlA
ord17
ord18
ord23
ord57
ord20
ord16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ