Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
a660126726115f0b86ea52b380700128_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a660126726115f0b86ea52b380700128_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a660126726115f0b86ea52b380700128_JaffaCakes118
Size
656KB
MD5
a660126726115f0b86ea52b380700128
SHA1
62083e57c65a1a45a918e585c10e5c1f60c53ba7
SHA256
13ab7b513ad5fa8629981c1b3e802084312fd54707d3b6ecac4f740a783766a3
SHA512
9bda8f06b1e539b8e33233ab82a1e2b05c2cfb0d9c7c3f68ffda975fdb5f82e834c5abf444082c40964cc5bdc00b539b33440f0d98562bb0d90a7946755843fa
SSDEEP
12288:DLMz7sk5HHIFdfFBF7WFCcVS5CAbCooscASj/3BRS2lbGn7VaV:8z7KzcE5CA2vsTSjfBRSebG7kV
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityDescriptorDacl
RegSetValueExW
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegFlushKey
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
IsValidSid
InitializeSecurityDescriptor
GetUserNameA
GetTokenInformation
GetLengthSid
FreeSid
EqualSid
AllocateAndInitializeSid
AdjustTokenPrivileges
GetKernelObjectSecurity
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
CreateWindowExA
WindowFromPoint
WaitForInputIdle
TranslateMessage
SystemParametersInfoA
ShowWindow
ShowOwnedPopups
SetWindowTextA
SetWindowPos
SetWindowPlacement
SetWindowLongA
SetTimer
SetRect
SetPropA
SetParent
SetForegroundWindow
SetFocus
SetCursor
SetClipboardData
SetClassLongA
SetCapture
SetActiveWindow
SendMessageTimeoutA
SendMessageCallbackA
SendMessageW
SendMessageA
ScreenToClient
RemovePropA
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClassA
PostThreadMessageA
PostQuitMessage
PostMessageA
PeekMessageW
PeekMessageA
OpenClipboard
OffsetRect
MsgWaitForMultipleObjects
MessageBoxA
MessageBeep
LoadStringA
LoadImageA
LoadCursorA
KillTimer
IsZoomed
IsWindowVisible
IsWindowUnicode
IsWindowEnabled
IsWindow
IsIconic
IsDialogMessageA
InvalidateRect
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSysColor
GetPropA
GetParent
GetWindow
GetMessageW
GetMessageA
GetMenu
GetKeyState
GetIconInfo
GetForegroundWindow
GetFocus
GetDC
GetCursorPos
GetCursor
GetClientRect
GetClassNameA
GetClassLongA
FrameRect
FindWindowExA
FindWindowA
FillRect
EnumWindows
EnumThreadWindows
EndPaint
EnableWindow
EmptyClipboard
DrawTextA
DrawIconEx
DrawFrameControl
DrawFocusRect
DispatchMessageA
DestroyWindow
DestroyIcon
DefWindowProcA
CloseClipboard
ChildWindowFromPointEx
CallWindowProcA
BringWindowToTop
BeginPaint
AttachThreadInput
CharNextA
CharToOemA
AdjustWindowRectEx
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
lstrlenW
lstrlenA
lstrcpyW
lstrcpyA
lstrcmpiW
lstrcmpiA
lstrcmpA
lstrcatW
WriteProcessMemory
WriteFile
WaitForSingleObject
WaitForMultipleObjectsEx
WaitForMultipleObjects
VirtualQueryEx
VirtualQuery
VirtualProtectEx
VirtualProtect
VirtualFree
VirtualAlloc
UnmapViewOfFile
TerminateThread
TerminateProcess
SystemTimeToFileTime
SuspendThread
Sleep
SizeofResource
SetThreadPriority
SetThreadContext
SetThreadAffinityMask
SetPriorityClass
SetLastError
SetFilePointer
SetFileAttributesA
SetEvent
SetEndOfFile
ResumeThread
ResetEvent
RemoveDirectoryA
ReleaseMutex
ReadProcessMemory
ReadFile
RaiseException
QueryPerformanceFrequency
QueryPerformanceCounter
PulseEvent
OpenProcess
OpenMutexW
OpenMutexA
OpenFileMappingW
OpenFileMappingA
OpenEventA
MapViewOfFile
LockResource
LocalSize
LocalFree
LocalAlloc
LoadResource
LoadLibraryExA
LoadLibraryW
LoadLibraryA
LeaveCriticalSection
IsBadReadPtr
InitializeCriticalSection
GlobalUnlock
GlobalSize
GlobalReAlloc
GlobalMemoryStatus
GlobalHandle
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersionExW
GetVersionExA
GetVersion
GetTickCount
GetThreadPriority
GetThreadLocale
GetThreadContext
GetTempPathA
GetSystemTime
GetSystemDirectoryW
GetSystemDirectoryA
GetStdHandle
GetStartupInfoA
GetProcessVersion
GetProcessAffinityMask
GetProcAddress
GetPriorityClass
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFileTime
GetFileSize
GetFileAttributesW
GetFileAttributesA
GetExitCodeThread
GetExitCodeProcess
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
GetComputerNameA
GetCommandLineA
GetCPInfo
FreeResource
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
FreeLibrary
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsA
ExitProcess
EnumCalendarInfoA
EnterCriticalSection
DuplicateHandle
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateThread
CreateSemaphoreA
CreateProcessA
CreateMutexW
CreateMutexA
CreateFileMappingW
CreateFileMappingA
CreateFileW
CreateFileA
CreateEventA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
Sleep
TextOutA
StartPage
StartDocA
SetTextColor
SetMapMode
SetBkMode
SetBkColor
SelectObject
SelectClipRgn
MoveToEx
LineTo
GetTextMetricsA
GetTextFaceA
GetTextExtentPoint32A
GetStockObject
GetRgnBox
GetObjectA
GetDeviceCaps
GdiFlush
EndPage
EndDoc
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgnIndirect
CreatePen
CreateFontA
CreateDIBSection
CreateDCA
CreateCompatibleDC
CombineRgn
BitBlt
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
WSACleanup
WSAStartup
gethostbyname
socket
setsockopt
sendto
send
select
recvfrom
recv
inet_addr
htons
connect
closesocket
bind
Shell_NotifyIconA
ShellExecuteA
SHGetFileInfoA
CreateStreamOnHGlobal
GetHGlobalFromStream
CreateStreamOnHGlobal
ImageList_GetIconSize
ImageList_Write
ImageList_Read
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
InitCommonControls
ImageList_Write
PrintDlgA
GetSaveFileNameA
madTraceProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ