Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
70bb22c6a1054cd15d012bc4fa529b24_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
70bb22c6a1054cd15d012bc4fa529b24_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
70bb22c6a1054cd15d012bc4fa529b24_JaffaCakes118
Size
240KB
MD5
70bb22c6a1054cd15d012bc4fa529b24
SHA1
423d17de49fdeffbe1bad727abc4af9e4a163e21
SHA256
98636a367447b8fc1b4af409ab41d565f19af848afe411ebcb3121c27f1d5154
SHA512
b0434ae1518bbaeabca5deeb6e0fea7efc29988871e236669b49593e84c2f70e669624871b4dcfb6112fd661bd082463f679249775b8efbd5897e6e9d91f658b
SSDEEP
6144:udkzyL3keSTR/G0aTBq/EnpsJHninW358L3Ko:ugyL3k9pG5Ts/jhninW353o
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VerQueryValueA
GetWindowsDirectoryA
MoveFileExA
LocalAlloc
lstrlenA
FormatMessageA
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleHandleA
DeleteFileA
WritePrivateProfileStringA
CloseHandle
GetTickCount
WaitForMultipleObjects
FreeLibrary
GetProcAddress
LoadLibraryA
GetTempFileNameA
GetTempPathA
CreateEventA
OpenProcess
GetCurrentProcessId
GetModuleFileNameA
GetLastError
GetVersionExA
LocalFree
Sleep
UnmapViewOfFile
GetComputerNameA
MapViewOfFile
CreateFileMappingA
Process32Next
Process32First
CreateToolhelp32Snapshot
WriteFile
SetFilePointer
CreateFileA
GetLocalTime
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
InterlockedExchange
HeapFree
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
GetTimeFormatA
GetDateFormatA
HeapAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
FlushFileBuffers
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
VirtualQuery
GetTimeZoneInformation
VirtualProtect
GetSystemInfo
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
HeapSize
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
SetStdHandle
ReadFile
GetLocaleInfoW
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
InitializeAcl
RegOpenKeyExA
RegSetValueExA
SetSecurityInfo
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ