Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
b6bf2fa4d063f32bb2a4bb7ca4824555_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b6bf2fa4d063f32bb2a4bb7ca4824555_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b6bf2fa4d063f32bb2a4bb7ca4824555_JaffaCakes118
Size
430KB
MD5
b6bf2fa4d063f32bb2a4bb7ca4824555
SHA1
2de6b51bb3cce931e5e665fb7a458185d6a8b9ed
SHA256
892a573a62d7ff284b67277b15a632fb2cc71e09d1616766daa51b0f647a4932
SHA512
f3446709676f540eaf4792451d5a258bdf671e02277f5458b7b1c94f0601552bd8d83159fb065b38d5edfe6a227242305cc56c869f5d473c25640fa87270e96f
SSDEEP
12288:R4k3ViprBlWaQBDrIrUgbVDgmb33cEfpjUb15R9xrd8i:R4kWg0URXdj
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
URLDownloadToCacheFileA
SetLastError
GetLastError
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
CloseHandle
RaiseException
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
lstrlenW
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleFileNameA
Sleep
GetExitCodeProcess
WaitForSingleObject
GetModuleHandleA
LoadLibraryA
GetCurrentProcess
OpenProcess
GetVersion
CopyFileExA
GetTempPathA
ExpandEnvironmentStringsA
MoveFileExA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetModuleFileNameW
FormatMessageA
LocalFree
DeleteCriticalSection
InitializeCriticalSection
OutputDebugStringA
DebugBreak
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
lstrlenA
InterlockedDecrement
TerminateProcess
LoadLibraryW
ExitProcess
GetFileType
GetStdHandle
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetProcessHeap
SetEndOfFile
WriteConsoleW
SetHandleCount
HeapSize
HeapCreate
GetStringTypeW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
InterlockedExchange
EncodePointer
DecodePointer
HeapFree
RtlUnwind
GetSystemTimeAsFileTime
GetLocalTime
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetACP
AttachThreadInput
SetForegroundWindow
BringWindowToTop
SetFocus
GetWindowThreadProcessId
PostMessageA
MessageBoxA
GetForegroundWindow
EnumWindows
GetWindowTextA
CharLowerA
DestroyWindow
CharNextA
LoadStringA
wvsprintfA
FindWindowExA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryInfoKeyW
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
OpenProcessToken
ShellExecuteExA
SHGetFolderPathA
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
VariantClear
VarUI4FromStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ