Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
aad9c1d68c09e2c6903f7a6630309477_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aad9c1d68c09e2c6903f7a6630309477_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
aad9c1d68c09e2c6903f7a6630309477_JaffaCakes118
Size
1.1MB
MD5
aad9c1d68c09e2c6903f7a6630309477
SHA1
911d04a22fa274ecb58a7d569b147f103f32aec5
SHA256
7d02c72ac9954443d29429bd64e32ec1e1e460bfc1d226b6a715eb47689dc715
SHA512
07bb557908a318b87c5284c2e9637813da69266b45742bae29aa21074bcf33733ed3785b73f3edcb6e5d437d8b09758da339657733456b0d27d44d4129bd5e32
SSDEEP
24576:rVpg1ZcSf85Sjo3VRFYsWmvnKT8kYpRKKW9UjbSMhPY:xwOSE5SjkRFYsBfY8kYE9ObBG
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrStrA
StrNCatA
StrStrIA
wnsprintfA
StrChrA
StrToIntA
WritePrivateProfileStringA
LocalAlloc
LocalFree
CreateThread
GetLocalTime
GetVersionExA
GetCurrentProcessId
FindResourceA
GetExitCodeProcess
GetTempPathA
GetFileAttributesA
FindFirstFileA
FindClose
FindNextFileA
FreeResource
LoadResource
GlobalLock
GlobalAlloc
SizeofResource
MulDiv
GlobalUnlock
GlobalFree
LockResource
MoveFileExA
MultiByteToWideChar
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetPrivateProfileStringA
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
WideCharToMultiByte
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
GetCurrentProcess
FreeLibrary
ReadFile
WriteFile
HeapFree
HeapAlloc
GetFileSize
CreateFileA
lstrcpyA
CloseHandle
CreateToolhelp32Snapshot
Process32Next
Process32First
DeleteFileA
CreateMutexA
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetLastError
CreateDirectoryA
lstrlenW
lstrcatA
Sleep
GetWindowsDirectoryA
GetProcessHeap
GetTickCount
lstrcpynA
lstrlenA
lstrcmpA
ExitProcess
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
FlushFileBuffers
TlsGetValue
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
GetStartupInfoA
GetCommandLineA
RedrawWindow
GetWindowTextLengthA
IsDlgButtonChecked
CheckRadioButton
EnableWindow
FillRect
ReleaseDC
GetDlgItem
SetWindowTextA
GetWindowDC
GetDlgCtrlID
EndPaint
SetCursor
GetKeyState
GetFocus
GetParent
DrawTextA
BeginPaint
GetDC
GetWindowTextA
SetWindowLongA
InvalidateRect
PostMessageA
UpdateWindow
DestroyWindow
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SetFocus
SendMessageA
IsDialogMessageA
TranslateMessage
MessageBoxA
GetWindowLongA
CreateWindowExA
PeekMessageA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
FindWindowA
ExitWindowsEx
IsWindowEnabled
CreateDIBitmap
LPtoDP
GetDeviceCaps
DPtoLP
SetMapMode
GetMapMode
SetBkColor
GetStockObject
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
GetObjectA
TextOutA
GetTextExtentPointA
AdjustTokenPrivileges
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupPrivilegeValueA
SetNamedSecurityInfoA
RegOpenKeyExA
SetFileSecurityA
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
RegQueryValueExA
OpenProcessToken
RegOpenKeyA
RegCloseKey
RegCreateKeyA
RegSetValueExA
ShellExecuteA
SHGetFolderPathA
ShellExecuteExA
CreateStreamOnHGlobal
OleLoadPicture
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ