Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
82f939b9093ff3b189e63c467e9f8caf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
82f939b9093ff3b189e63c467e9f8caf_JaffaCakes118.exe
Resource
win10v2004-20240730-en
Target
82f939b9093ff3b189e63c467e9f8caf_JaffaCakes118
Size
6.5MB
MD5
82f939b9093ff3b189e63c467e9f8caf
SHA1
4d2d7fb5913a95f6332acb73cb712815722fed7b
SHA256
e30adca8dd25a0c06bee1fffba35e0f74c94af3b7fd5245310a5edbfb4c54e67
SHA512
bed3d35cc6fb06ed24a6bfabe33e74c2046d1472c16a534788e8eff266c5d54d5c4dcf1dbea3057b97f5076ad775b454490a0e9f12aeb7b6a1c5f82e62fe4c2e
SSDEEP
24576:VHjMTdyaiQdWEGanyphlNV+WQJjGW/aEzWT7TQLb/nqBvccx7qZ5:VHXVQdWzanypVV+nJjGwzHqBpE5
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\Documents and Settings\Timothy\My Documents\WorkCode\AdwareAlert\trunk\release\AdwareAlert.pdb
Tcl_CreateCommand
Tcl_ProcCmd
Tcl_CreateInterp
Tcl_CloneInterp
Tcl_DeleteClone
Tcl_GetStringResult
Tcl_EvalEx
Tcl_ResetResult
Tcl_DeleteInterp
Tcl_SplitList
Tcl_FreeList
Tcl_SetResult
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
SearchPathA
CreateProcessA
WritePrivateProfileStringA
GetCurrentThread
LocalAlloc
lstrcmpA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GlobalDeleteAtom
SetThreadPriority
SuspendThread
GlobalAddAtomA
GetCurrentProcessId
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetModuleFileNameW
GetThreadLocale
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
InterlockedIncrement
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GetSystemTime
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
GetCommandLineA
GetStartupInfoA
ExitThread
GetSystemTimeAsFileTime
RaiseException
GetTimeFormatA
GetDateFormatA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetStdHandle
GetFileType
ExitProcess
HeapSize
GetACP
IsValidCodePage
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetDriveTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
lstrcatA
TerminateProcess
GetVersionExA
GetSystemInfo
GetFileTime
ExpandEnvironmentStringsA
CreateThread
SetConsoleScreenBufferSize
GetStdHandle
GetConsoleScreenBufferInfo
AllocConsole
FreeConsole
TlsFree
TlsAlloc
CreateNamedPipeA
DisconnectNamedPipe
FlushFileBuffers
WriteFile
HeapCreate
MoveFileA
ReadFile
HeapDestroy
LeaveCriticalSection
EnterCriticalSection
ConnectNamedPipe
HeapCompact
HeapAlloc
DeleteCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapFree
lstrcpyA
CreateFileA
GetFileSize
InterlockedDecrement
TerminateThread
TlsGetValue
TlsSetValue
lstrcpynA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
Sleep
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
DeleteFileA
CreateDirectoryA
LoadLibraryA
FreeLibrary
GetModuleFileNameA
FormatMessageA
LocalFree
GetSystemDirectoryA
GetTempPathA
GetLocalTime
GetCurrentProcess
GetWindowsDirectoryA
CreateEventA
GlobalAlloc
ResumeThread
GlobalFree
MulDiv
GlobalUnlock
ResetEvent
GlobalLock
SetEvent
WaitForSingleObject
CloseHandle
GetModuleHandleA
GetProcAddress
FreeResource
GetEnvironmentVariableA
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
WinExec
GetLogicalDriveStringsA
GetTickCount
SetCapture
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
RegisterClipboardFormatA
PostThreadMessageA
MessageBeep
CharNextA
SetWindowContextHelpId
MapDialogRect
DestroyMenu
InflateRect
GrayStringA
DrawTextExA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
RemovePropA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
UpdateWindow
GetMenu
GetClassInfoExA
GetClassInfoA
AdjustWindowRectEx
GetScrollInfo
CallWindowProcA
OffsetRect
IntersectRect
GetWindowPlacement
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
SetFocus
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetWindow
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
TrackMouseEvent
PeekMessageA
DispatchMessageA
TranslateMessage
GetSysColorBrush
CopyIcon
GetCaretPos
RedrawWindow
SetTimer
SystemParametersInfoA
SetWindowPos
GetWindowDC
ScreenToClient
ModifyMenuA
GetSystemMetrics
LoadIconA
IsIconic
DrawIcon
PtInRect
MessageBoxA
IsWindow
EqualRect
RegisterClassA
CharUpperA
LoadBitmapA
SendMessageA
GetWindowRect
CopyRect
PostMessageA
EnableWindow
SetRect
GetCursorPos
LoadMenuA
SetForegroundWindow
GetWindowLongA
GetSubMenu
SetWindowLongA
SetWindowRgn
GetClientRect
InvalidateRect
GetDC
HideCaret
ReleaseDC
GetParent
LoadImageA
KillTimer
LoadCursorA
FillRect
DestroyCursor
GetSysColor
SetCursor
SetClassLongA
DrawEdge
DrawFocusRect
ClientToScreen
ReleaseCapture
GetCapture
WindowFromPoint
FindWindowA
GetDesktopWindow
ExitWindowsEx
SetPropA
GetDlgCtrlID
DefWindowProcA
GetPropA
UnregisterClassA
RegisterClassExA
DrawTextA
GetWindowTextA
GetWindowTextLengthA
SendMessageCallbackA
CreateWindowExA
EndPaint
BeginPaint
GetCurrentObject
GetCurrentPositionEx
ArcTo
ExtSelectClipRgn
CreatePen
StretchBlt
GetTextExtentPoint32A
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
CreateCompatibleDC
CombineRgn
CreateBitmap
GetObjectA
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
SetMapMode
RestoreDC
SaveDC
CreateRectRgnIndirect
GetClipBox
GetDIBits
SetTextColor
SetBkColor
SetBkMode
CreateFontIndirectA
SelectClipRgn
ExtTextOutA
GetTextMetricsA
DeleteDC
SelectObject
GetDeviceCaps
Rectangle
ExtCreateRegion
CreateRectRgn
CreateSolidBrush
GetPixel
DeleteObject
GetStockObject
CreatePatternBrush
CreateCompatibleBitmap
BitBlt
ScaleWindowExtEx
GetFileTitleA
DocumentPropertiesA
ClosePrinter
OpenPrinterA
ord17
_TrackMouseEvent
PathFileExistsA
UrlUnescapeA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
SHDeleteKeyA
PathIsDirectoryA
ord8
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitializeEx
CreateStreamOnHGlobal
CoRegisterMessageFilter
OleUninitialize
OleLoadPicture
VariantClear
SysFreeString
SysAllocString
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
SysAllocStringLen
OleCreateFontIndirect
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
InternetQueryDataAvailable
inflate
inflateInit2_
inflateEnd
GradientFill
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ