Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
87e2eed0fbe63baf5455ccc153139012_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
87e2eed0fbe63baf5455ccc153139012_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
87e2eed0fbe63baf5455ccc153139012_JaffaCakes118
Size
6.1MB
MD5
87e2eed0fbe63baf5455ccc153139012
SHA1
efbdae6050182bc7d2a6ac32f8809a0977b4427e
SHA256
e5f0f1ed3967f21deda5116c4ebd0acbf4be260576763194a84a0b735e0e203f
SHA512
69c75b0f4605c73ddf2a6184a9374e12f3949ebfce21adacf2bf2b2bdb37d07ed82d6b7bb8b614a01b05f6c52dc8b1c678322a00ec41a274fed4e6a5d273eb61
SSDEEP
24576:M7uJdVQ+Tn7Al2v2n/VUt2i3Yn/aEzW1oyYB4dd9lXdzk:SuJM+r7Acv2nNar3YNzl4dd9lXd
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\Documents and Settings\Timothy\My Documents\WorkCode\SpywareBot\trunk\release\SpywareBot.pdb
Tcl_DeleteInterp
Tcl_ProcCmd
Tcl_ResetResult
Tcl_GetStringResult
Tcl_DeleteClone
Tcl_CloneInterp
Tcl_CreateInterp
Tcl_CreateCommand
Tcl_EvalEx
Tcl_SplitList
Tcl_FreeList
Tcl_SetResult
ConvertDefaultLocale
GetCurrentThreadId
GetCurrentThread
GlobalDeleteAtom
SetThreadPriority
SuspendThread
GlobalAddAtomA
GetCurrentProcessId
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetModuleFileNameW
InterlockedDecrement
GetThreadLocale
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
LocalAlloc
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
InterlockedIncrement
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EnumResourceLanguagesA
HeapReAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
GetCommandLineA
GetStartupInfoA
ExitThread
GetTimeFormatA
GetDateFormatA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetStdHandle
GetFileType
GetSystemTimeAsFileTime
ExitProcess
RaiseException
HeapSize
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetACP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoA
lstrcmpA
ReadFile
ConnectNamedPipe
HeapCompact
CreateNamedPipeA
DisconnectNamedPipe
FlushFileBuffers
WriteFile
HeapCreate
MoveFileA
HeapDestroy
CreateFileA
GetFileSize
GetFullPathNameA
TerminateThread
lstrcpynA
FileTimeToLocalFileTime
SetLastError
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
DeleteFileA
GetSystemDirectoryA
GetTempPathA
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
HeapFree
GetProcessHeap
HeapAlloc
FreeLibrary
LoadLibraryA
GetFileTime
ExpandEnvironmentStringsA
CreateThread
TerminateProcess
GetCurrentProcess
GetVersionExA
GetSystemInfo
LocalFree
lstrcatA
WinExec
FormatMessageA
FileTimeToSystemTime
Sleep
InitializeCriticalSection
lstrcpyA
SetConsoleScreenBufferSize
GetStdHandle
GetModuleFileNameA
GetConsoleScreenBufferInfo
AllocConsole
DeleteCriticalSection
FreeConsole
LeaveCriticalSection
GetLogicalDriveStringsA
SearchPathA
CreateProcessA
GetSystemTime
EnterCriticalSection
CreateDirectoryA
GetLocalTime
CloseHandle
GetWindowsDirectoryA
CreateEventA
GlobalAlloc
ResumeThread
GlobalFree
MulDiv
GlobalUnlock
ResetEvent
GlobalLock
SetEvent
WaitForSingleObject
FreeResource
GetModuleHandleA
GetProcAddress
GetEnvironmentVariableA
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
IsDebuggerPresent
CharNextA
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
RegisterClipboardFormatA
PostThreadMessageA
SetCapture
MessageBeep
SetWindowContextHelpId
MapDialogRect
DestroyMenu
InflateRect
GrayStringA
DrawTextExA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
RemovePropA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
UpdateWindow
GetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
CallWindowProcA
OffsetRect
IntersectRect
GetWindowPlacement
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
SetFocus
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetWindow
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
ValidateRect
GetMenuCheckMarkDimensions
GetFocus
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
PeekMessageA
DispatchMessageA
TranslateMessage
GetSysColorBrush
GetCaretPos
SystemParametersInfoA
SetWindowPos
GetWindowDC
ScreenToClient
ModifyMenuA
LoadIconA
IsIconic
DrawIcon
MessageBoxA
IsWindow
EqualRect
FindWindowA
GetDesktopWindow
ExitWindowsEx
TrackMouseEvent
GetSystemMetrics
EndPaint
BeginPaint
SetPropA
GetDlgCtrlID
DefWindowProcA
GetPropA
UnregisterClassA
RegisterClassExA
DrawTextA
GetWindowTextA
GetWindowTextLengthA
SendMessageCallbackA
CreateWindowExA
DrawEdge
WindowFromPoint
GetCapture
ReleaseCapture
ClientToScreen
DrawFocusRect
DestroyCursor
FillRect
LoadCursorA
SetClassLongA
SetCursor
GetSysColor
KillTimer
GetDC
InvalidateRect
GetClientRect
SetWindowRgn
LoadImageA
GetParent
ReleaseDC
HideCaret
SetWindowLongA
GetSubMenu
GetWindowLongA
SetForegroundWindow
LoadMenuA
GetCursorPos
SetRect
GetWindowRect
SendMessageA
LoadBitmapA
EnableWindow
PostMessageA
CopyRect
CharUpperA
SetTimer
RedrawWindow
SetMenuItemBitmaps
CopyIcon
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreatePatternBrush
GetTextExtentPoint32A
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
BitBlt
CreateCompatibleBitmap
StretchBlt
CreateRectRgnIndirect
GetObjectA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
GetClipBox
GetDIBits
CreateFontIndirectA
SetTextColor
SetBkColor
SetBkMode
GetTextMetricsA
SelectClipRgn
ExtTextOutA
DeleteDC
SelectObject
GetDeviceCaps
Rectangle
CombineRgn
CreateCompatibleDC
CreateBitmap
ExtCreateRegion
CreateRectRgn
CreateSolidBrush
GetPixel
DeleteObject
GetStockObject
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ord17
_TrackMouseEvent
PathStripToRootA
PathIsDirectoryA
SHDeleteKeyA
PathFindExtensionA
PathFindFileNameA
PathIsUNCA
UrlUnescapeA
PathFileExistsA
ord8
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CreateILockBytesOnHGlobal
CoTaskMemFree
CoUninitialize
CoInitializeEx
CreateStreamOnHGlobal
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysStringLen
SysFreeString
OleLoadPicture
VariantCopy
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
InternetQueryDataAvailable
HttpQueryInfoA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
inflate
inflateInit2_
inflateEnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ