Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a87f2a055f0c66ae9b7498b505a6d327_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a87f2a055f0c66ae9b7498b505a6d327_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a87f2a055f0c66ae9b7498b505a6d327_JaffaCakes118
Size
541KB
MD5
a87f2a055f0c66ae9b7498b505a6d327
SHA1
f538585e4e03597cee1543c77d4262d7a2af1352
SHA256
6ef5d4ba3c2e5fb35c9a0881dee4b1e701c1198304c7e18d705942a399a9fc56
SHA512
e04540fa1c9c8cf51ecb8e97520f7e1d11e11d9f1619c0acf765c811cae0324c2b1b9a724646385e1d3e20ff79eacc5f01d27f59065442759fb012da84e21e19
SSDEEP
12288:gtf37Vme4WcxHQSRoGxSaGSjclc+IHIQnfWhD9jEEQ8OI:gtf3hme4WcxHtonSjclc+IHIQnf2jEVW
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProfilesDirectoryA
lstrcpyA
HeapAlloc
HeapFree
GetProcessHeap
Sleep
WriteFile
CreateProcessA
GetModuleHandleA
SetFilePointer
ReadFile
CreateDirectoryA
GetVolumeInformationA
LocalFree
SleepEx
MultiByteToWideChar
GetCurrentDirectoryA
lstrcmpA
GetCurrentProcess
OpenProcess
GlobalAlloc
GlobalFree
LoadLibraryExA
FindNextFileA
GetFullPathNameA
DosDateTimeToFileTime
SetFileTime
GetFileTime
LocalFileTimeToFileTime
WaitForSingleObject
TerminateProcess
SetLastError
GetModuleFileNameA
GetVersionExA
GetSystemTimeAsFileTime
ExitProcess
GetCurrentProcessId
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
OpenMutexA
FindClose
FindFirstFileA
lstrcatA
GetFileAttributesA
lstrlenA
CreateFileA
OpenFileMappingA
CloseHandle
CreateToolhelp32Snapshot
CreateFileMappingA
Process32Next
LoadLibraryA
GetProcAddress
GetLastError
WideCharToMultiByte
ExpandEnvironmentStringsA
Process32First
InterlockedDecrement
FreeLibrary
lstrcpynA
MapViewOfFile
VirtualQuery
lstrcmpiA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
RaiseException
RtlUnwind
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
IsWindow
GetWindowThreadProcessId
GetClassNameA
EnumWindows
GetShellWindow
IsWindowVisible
GetUserObjectSecurity
AdjustTokenPrivileges
IsValidSid
GetSecurityDescriptorOwner
LookupPrivilegeValueA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
ConvertSidToStringSidA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyA
RegEnumKeyA
RegCloseKey
RegOpenKeyA
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerA
QueryServiceStatus
CloseServiceHandle
OpenServiceA
ShellExecuteA
SHGetFolderPathA
ord680
CoUninitialize
CoInitialize
CoCreateInstance
VariantClear
AssocQueryStringA
StrChrA
wnsprintfA
PathFileExistsA
StrDupA
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ