Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
684343af2bfbc01ddcdeca761c66ea0d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
684343af2bfbc01ddcdeca761c66ea0d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
684343af2bfbc01ddcdeca761c66ea0d_JaffaCakes118
Size
998KB
MD5
684343af2bfbc01ddcdeca761c66ea0d
SHA1
9435b5aeaf3f59178d252a27600fca35b26cff34
SHA256
07484050fea45cb8c90782245030dc8483d92ef6364e0220b055df9c34d00ff4
SHA512
4e8fac5aa025074078b1dfb99cf0c85fc6931b2f28e21872b45ba8c27bcf44c013cfa3f31713d6079400a9cf3294923658ce375034c98fe5b166ab51c22674ae
SSDEEP
24576:7Xgm/tTrlOCqSuD7VN84FKjWrOhGIErdCnt:0mVTcC3aVN83q8G1r8
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitCommonControlsEx
UuidToStringA
UuidCreate
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
CreateProcessA
WinExec
GetComputerNameA
GetVolumeInformationA
GetTickCount
GetCurrentProcessId
HeapReAlloc
SetFilePointer
GetModuleHandleA
GetCurrentProcess
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
TerminateProcess
MultiByteToWideChar
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FlushFileBuffers
GetLocaleInfoA
HeapSize
RtlUnwind
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEndOfFile
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetHandleCount
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapCreate
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
RaiseException
FreeLibrary
WaitForSingleObject
CreateThread
WritePrivateProfileStringA
GetFileAttributesA
GetExitCodeProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
Sleep
GetTempPathA
GetVersionExA
ExitProcess
CreateMutexA
LoadLibraryA
GetProcAddress
lstrcmpiA
lstrcmpA
GetPrivateProfileStringA
lstrlenA
lstrcatA
lstrcpynA
lstrcpyA
HeapFree
WriteFile
DeleteFileA
GetProcessHeap
HeapAlloc
CreateDirectoryA
ReadFile
GetFileSize
CreateFileA
GetModuleFileNameA
CloseHandle
GetLastError
LocalFree
LocalAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
GetFileType
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
CreateWindowExA
DefWindowProcA
GetWindowLongA
GetDC
GetClientRect
PostQuitMessage
SendMessageA
GetMessageA
DispatchMessageA
ExitWindowsEx
GetParent
LoadIconA
RedrawWindow
ShowWindow
IsWindow
SystemParametersInfoA
GetWindowTextLengthA
CheckRadioButton
PostMessageA
GetWindowTextA
IsDlgButtonChecked
GetFocus
UpdateWindow
SetCursor
DestroyWindow
LoadCursorA
MessageBoxA
FillRect
GetWindowRect
GetDlgCtrlID
GetDlgItem
EnableWindow
SetWindowTextA
EndPaint
RegisterClassExA
GetWindowDC
BeginPaint
DrawFocusRect
SetWindowLongA
InvalidateRect
ReleaseDC
IsDialogMessageA
SetForegroundWindow
FindWindowA
SetFocus
TranslateMessage
CreateDIBitmap
DeleteObject
DeleteDC
BitBlt
GetObjectA
CreateCompatibleDC
CreateSolidBrush
SetBkColor
SetTextColor
SelectObject
TextOutA
CreateFontA
SetBkMode
GetStockObject
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueA
CheckTokenMembership
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
FreeSid
SetFileSecurityA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
ShellExecuteExA
SHGetFolderPathA
ShellExecuteA
SHGetSpecialFolderPathA
CoTaskMemAlloc
PathFileExistsA
AssocQueryStringA
StrNCatA
StrToIntA
wnsprintfA
StrStrA
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ