Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
a491dfc55cadec9fc534a815e12d330b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a491dfc55cadec9fc534a815e12d330b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a491dfc55cadec9fc534a815e12d330b_JaffaCakes118
Size
638KB
MD5
a491dfc55cadec9fc534a815e12d330b
SHA1
b140b94f3ae97e6955e07f72a4d606723ae7772a
SHA256
2655951855b1dd12191d578a634b3ad7bbe4cf19b191fa27c0409992842e1446
SHA512
0be00a0840595fd0bc033c9de4028df6ab56a7cc29bdb8e1a7becf0c323ea838f0b5eed6366a1d890d49baff04df17514b5ea96b0847e04907ed4ebade7bcc49
SSDEEP
12288:0ePOsr6KFqfei7TyUQmcaXOCw8LiFsXKXiSQCVfxJ9+I:0ePvhFqfeiCU2aXOCw8Li2XKXiSQCVfZ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\build\BASS_REL_5_60_48_18\win_external_wl_1\src\tools\install\app\bcmwls\x64\Release\bcmwls64.pdb
SetupGetBinaryField
SetupGetTargetPathW
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiCallClassInstaller
SetupDiSetDeviceRegistryPropertyW
SetupDiCreateDeviceInfoW
SetupDiCreateDeviceInfoList
SetupDiGetINFClassW
CM_Get_DevNode_Registry_PropertyW
SetupDiOpenDevRegKey
CM_Get_DevNode_Status
SetupDiGetDeviceInstallParamsW
SetupDiSetClassInstallParamsW
CMP_WaitNoPendingInstallEvents
CM_Reenumerate_DevNode
SetupIterateCabinetW
SetupOpenFileQueue
SetupDefaultQueueCallbackW
SetupInitDefaultQueueCallbackEx
SetupCommitFileQueueW
SetupScanFileQueueW
SetupGetFileCompressionInfoW
SetupDecompressOrCopyFileW
SetupCopyOEMInfW
SetupCloseFileQueue
SetupTermDefaultQueueCallback
SetupGetSourceFileLocationW
SetupGetIntField
SetupGetStringFieldW
SetupGetFieldCount
SetupFindNextMatchLineW
SetupGetLineTextW
SetupGetLineByIndexW
SetupFindFirstLineW
SetupGetLineCountW
SetupOpenInfFileW
SetupCloseInfFile
CM_Locate_DevNodeW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
WinVerifyTrust
GetCurrentThreadId
FlsFree
TlsFree
FlsSetValue
TlsAlloc
FlsGetValue
RtlVirtualUnwind
GetFileType
SetStdHandle
GetSystemTimeAsFileTime
RtlCaptureContext
IsDebuggerPresent
SetUnhandledExceptionFilter
SetEnvironmentVariableA
CompareStringW
CompareStringA
CreateFileA
SetEndOfFile
GetLocaleInfoW
GetFileAttributesW
ExpandEnvironmentStringsW
lstrcpyW
lstrcatW
CloseHandle
GetCurrentProcess
GetModuleHandleW
GetSystemDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryW
GetLastError
GetSystemWow64DirectoryW
SetLastError
lstrlenW
LocalAlloc
LocalFree
GetCommandLineW
MultiByteToWideChar
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
Sleep
Module32NextW
Module32FirstW
TlsSetValue
SetThreadLocale
GetThreadLocale
CreateFileW
DeleteFileW
FlushFileBuffers
WriteFile
ReadFile
SetFilePointer
SetErrorMode
SetNamedPipeHandleState
DuplicateHandle
CreatePipe
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetCurrentProcessId
OutputDebugStringW
OutputDebugStringA
MoveFileExW
SetFileAttributesW
CopyFileW
GetModuleHandleA
GetStdHandle
MoveFileW
RemoveDirectoryW
GetVersionExW
GetVersionExA
GetFullPathNameW
GetTempFileNameW
GetModuleFileNameW
GetWindowsDirectoryW
GetCurrentDirectoryW
FindClose
FindFirstFileW
GetCurrentThread
GetUserDefaultLangID
WideCharToMultiByte
FormatMessageW
GetStringTypeA
UnhandledExceptionFilter
TerminateProcess
RtlPcToFileHeader
RtlUnwindEx
RtlLookupFunctionEntry
DeleteCriticalSection
InitializeCriticalSection
FlsAlloc
ExitProcess
GetModuleFileNameA
HeapSetInformation
HeapCreate
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FatalAppExitA
SetHandleCount
GetStartupInfoA
GetDateFormatA
GetTimeFormatA
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
QueryPerformanceCounter
GetTickCount
SetConsoleCtrlHandler
LoadLibraryA
CreateToolhelp32Snapshot
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetLocaleInfoA
GetACP
ExitWindowsEx
EnumWindows
GetClassNameW
GetWindowThreadProcessId
GetWindowTextW
SendMessageW
UnregisterClassA
ImpersonateSelf
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegLoadKeyW
RegUnLoadKeyW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegEnumValueW
SHGetPathFromIDListW
SHBindToParent
SHCreateDirectoryExW
SHSetLocalizedName
SHGetMalloc
SHBrowseForFolderW
SHFileOperationW
SHGetSpecialFolderPathW
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoCreateInstance
CoInitialize
CoTaskMemAlloc
SHDeleteKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ