Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
c832e54f982c5b0d9106b36f00d8cba9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c832e54f982c5b0d9106b36f00d8cba9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c832e54f982c5b0d9106b36f00d8cba9_JaffaCakes118
Size
221KB
MD5
c832e54f982c5b0d9106b36f00d8cba9
SHA1
f53f6d2ce6dc41e3c820a4816a1d3cb302e3ef52
SHA256
1e86c3167c438365caa4b659f73b94b616c52bf8bdcef0983b1c1b442f09f18f
SHA512
65838056e9008c1f962266c8bd29744aca322d871ea77e6d5258fec416b17a6430d9a7487c72b4fa8e6b7816d04186ebab2040eaf4ee91cbe2222b075943c882
SSDEEP
3072:dQPTY6g1BJ1WMY0gOXPXCI0BGduQuy4HYHzLE:GsVaB0P/SBJ5H6zL
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
U:\install\msi\local\current\Release\bin\common\Setup.pdb
InitCommonControlsEx
PathUnquoteSpacesW
PathFindExtensionW
PathStripPathW
PathRemoveFileSpecW
PathAppendW
PathRenameExtensionW
PathFileExistsW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
SHGetFolderPathW
ord8
ord160
ord159
ord32
ord118
ord92
WideCharToMultiByte
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LoadLibraryA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
lstrcpyW
lstrcmpiW
lstrlenW
lstrcpynW
GetPrivateProfileSectionW
GetPrivateProfileStringW
GetPrivateProfileIntW
LoadLibraryW
FreeLibrary
GetProcAddress
ExpandEnvironmentStringsW
GetTempFileNameW
GetTempPathW
GetCurrentProcess
GetVersionExW
CloseHandle
lstrcmpW
GetLastError
CreateMutexW
GlobalFree
GlobalAlloc
GetSystemDirectoryW
WriteFile
GetLocalTime
LocalFree
FormatMessageW
GetComputerNameW
SetFilePointer
GetStringTypeW
ReadFile
FlushFileBuffers
Sleep
MoveFileExW
GetExitCodeProcess
CreateProcessW
lstrcatW
VerifyVersionInfoW
VerSetConditionMask
GetModuleFileNameW
GetModuleHandleW
HeapDestroy
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
LCMapStringW
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
HeapSize
HeapReAlloc
HeapAlloc
HeapFree
GetVersionExA
GetStartupInfoW
RtlUnwind
TerminateProcess
SetStdHandle
VirtualProtect
GetSystemInfo
VirtualQuery
GetLocaleInfoA
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
CreateFileW
ExitProcess
GetModuleHandleA
SetCursor
GetWindowRect
SystemParametersInfoW
GetDlgItem
IsDialogMessageW
SetDlgItemTextW
DestroyWindow
MessageBoxW
LoadCursorW
ExitWindowsEx
TranslateMessage
DispatchMessageW
MsgWaitForMultipleObjects
PeekMessageW
GetSystemMetrics
LoadStringW
ShowWindow
LoadIconW
SetForegroundWindow
SetFocus
MoveWindow
SetWindowTextW
CreateDialogParamW
EndDialog
DialogBoxParamW
wsprintfW
SendMessageW
EqualSid
RegSetValueExW
GetUserNameW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
FreeSid
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE