Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
8d509f41dda7a5527d5c83cbf052afb0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8d509f41dda7a5527d5c83cbf052afb0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
8d509f41dda7a5527d5c83cbf052afb0_JaffaCakes118
Size
1.4MB
MD5
8d509f41dda7a5527d5c83cbf052afb0
SHA1
c2ee2d4f6334385d33ebe318199ff5ae58f6023b
SHA256
416514ea602f67a1c288cb8f43721995a2228077dfdb4e094536422921e6ecfb
SHA512
6f0e986f0136d0964ad10767956d1657f40064d231d4b2b09bf22b0bf310369f4e235cdedc14845e6767529db32b06a03b434be37429ad5c21ed2e1fba8ce730
SSDEEP
24576:rWvxmfpJ4zLcVbseYPHZT4uKVx4wjlj1MqUO1cTT2qlSM1j/wH3PXuYrJ:rWEpycb6P5T4lPv31cTleH3fhrJ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrChrA
PathFileExistsA
StrStrA
StrNCatA
StrStrIA
StrToIntA
wnsprintfA
UuidCreate
UuidToStringA
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetCurrentProcess
GetProcAddress
LoadLibraryA
DeleteFileA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetComputerNameA
GetVolumeInformationA
CreateThread
HeapAlloc
GetLocalTime
GetVersionExA
lstrcpyA
GetTickCount
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
ExpandEnvironmentStringsA
LocalFree
MoveFileExA
lstrcatA
GetModuleFileNameA
GetTempPathA
GetFileAttributesA
FindFirstFileA
FindClose
FindNextFileA
GetFileSize
WaitForSingleObject
ReadFile
CreateDirectoryA
ExitProcess
CreateMutexA
MultiByteToWideChar
LocalAlloc
GetModuleHandleA
GetCurrentProcessId
GetFullPathNameA
DosDateTimeToFileTime
SetFileTime
GetFileTime
LocalFileTimeToFileTime
WideCharToMultiByte
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
VirtualAlloc
FreeLibrary
DeleteCriticalSection
VirtualFree
HeapCreate
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
GetFileType
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Process32First
InterlockedDecrement
lstrcpynA
MapViewOfFile
WriteFile
GetProcessHeap
GetConsoleCP
GetLocaleInfoA
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetConsoleMode
SetFilePointer
SetEndOfFile
FreeEnvironmentStringsA
HeapFree
OpenMutexA
CreateFileA
lstrlenA
lstrcmpA
lstrcmpiA
TerminateProcess
CreateProcessA
GetExitCodeProcess
Sleep
OpenProcess
OpenFileMappingA
CloseHandle
CreateToolhelp32Snapshot
CreateFileMappingA
Process32Next
GetLastError
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
HeapSize
GetStringTypeA
GetStringTypeW
RedrawWindow
GetWindowTextLengthA
IsDlgButtonChecked
CheckRadioButton
EnableWindow
GetDlgItem
SetWindowTextA
GetUserObjectSecurity
GetWindowThreadProcessId
GetShellWindow
GetWindowDC
DrawFocusRect
GetDlgCtrlID
SetCursor
SetFocus
EndPaint
GetKeyState
GetFocus
LoadBitmapA
GetParent
IsWindowEnabled
BeginPaint
GetDC
DrawEdge
SetWindowLongA
InvalidateRect
ReleaseDC
PostMessageA
UpdateWindow
DestroyWindow
keybd_event
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SendMessageA
IsDialogMessageA
TranslateMessage
MapVirtualKeyA
MessageBoxA
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
FindWindowA
DrawTextA
PeekMessageA
MoveWindow
ExitWindowsEx
EnumWindows
GetClassNameA
GetWindowTextA
FillRect
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SetBkColor
CreateCompatibleDC
GetTextExtentPointA
GetObjectA
GetStockObject
TextOutA
SelectObject
CreateDIBitmap
RegDeleteKeyA
RegEnumKeyA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerA
QueryServiceStatus
CloseServiceHandle
OpenServiceA
SetEntriesInAclA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
RegCreateKeyA
RegSetValueExA
AdjustTokenPrivileges
IsValidSid
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
ConvertSidToStringSidA
LookupPrivilegeValueA
GetSecurityDescriptorOwner
RegOpenKeyA
SHGetFolderPathA
ShellExecuteExA
ShellExecuteA
CoTaskMemAlloc
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ