Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
845f893c6aff179c6260c26cdc8e4838_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
845f893c6aff179c6260c26cdc8e4838_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
845f893c6aff179c6260c26cdc8e4838_JaffaCakes118
Size
361KB
MD5
845f893c6aff179c6260c26cdc8e4838
SHA1
266c9c4dda65b6a3af68f509f14db123dc72a510
SHA256
5a6db7edda6810af63eace0cdb740a86e69320d2679405234781f76e4fabf8ba
SHA512
e2002cd8b698aebf72a780eefbb70b9cec76943f839d92cd1c0c531c9c4536288456dd78042aa53977fe8924cc87211a7efe2ead8ca02e7080c865d6ac69473f
SSDEEP
6144:W+rU5OQUzRd6+icLN+rbC+JZW08nidx3r2tgTJq0HalCbojDuUl+8:WD5VoRd6+6vJZW0Z3zeSeDuUl+8
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
TlsFree
InterlockedIncrement
ReadFile
SetFilePointer
SetEndOfFile
GetThreadLocale
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitProcess
HeapReAlloc
LocalReAlloc
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
HeapSize
SetStdHandle
GetFileType
GetACP
LCMapStringA
LCMapStringW
GetStdHandle
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedDecrement
GetModuleFileNameW
GlobalFlags
GetCurrentProcessId
LocalAlloc
GlobalUnlock
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalLock
OpenMutexA
GetUserDefaultLangID
FormatMessageA
LocalFree
GetStartupInfoA
CreateProcessA
GetExitCodeProcess
TerminateProcess
CreateDirectoryA
FlushFileBuffers
GlobalAlloc
GlobalFree
GetFileTime
CompareFileTime
WritePrivateProfileStringA
lstrcmpA
DeleteFileA
MoveFileA
GetDriveTypeA
SetLastError
GetVersionExA
GetShortPathNameA
GetTempPathA
GetLocaleInfoA
GetSystemDefaultLangID
InitializeCriticalSection
GetFileSize
GetCommandLineA
DeleteCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
WriteFile
OutputDebugStringA
GetEnvironmentVariableA
CompareStringW
CompareStringA
GetVersion
WideCharToMultiByte
InterlockedExchange
GetProcessHeap
HeapAlloc
HeapFree
Sleep
CreateMutexA
WaitForSingleObject
ReleaseMutex
GetSystemDirectoryA
CreateFileA
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
FindClose
CloseHandle
GetPrivateProfileStringA
GetCurrentDirectoryA
SetCurrentDirectoryA
lstrlenA
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
GetCurrentProcess
FreeLibrary
LoadLibraryA
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThreadId
GetTickCount
MultiByteToWideChar
GetLastError
EnterCriticalSection
LeaveCriticalSection
GetFullPathNameA
GetFileAttributesA
VirtualAlloc
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetWindowPos
ShowWindow
GetDlgItem
AdjustWindowRectEx
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetSysColor
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MessageBoxA
IsWindow
WaitForInputIdle
MsgWaitForMultipleObjects
GetWindowThreadProcessId
SetWindowTextA
GetSystemMetrics
PostQuitMessage
GetWindowLongA
GetDC
SetWindowLongA
ReleaseDC
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
SendMessageA
RegisterWindowMessageA
UnhookWindowsHookEx
GetClientRect
DeleteObject
GetClipBox
SetMapMode
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetTextColor
SetBkColor
RestoreDC
SaveDC
DocumentPropertiesA
OpenPrinterA
ClosePrinter
RegQueryValueA
RegEnumKeyA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegOpenKeyA
RegDeleteKeyA
RegSetValueExA
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
LookupAccountSidA
FreeSid
RegOpenKeyExA
EnumDependentServicesA
ControlService
OpenSCManagerA
OpenServiceA
StartServiceA
QueryServiceStatus
CloseServiceHandle
RegQueryValueExA
PathFindFileNameA
PathFindExtensionA
VariantClear
VariantInit
VariantChangeType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE