Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
c8c360d07889ab290b2503bb17b8faf0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c8c360d07889ab290b2503bb17b8faf0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c8c360d07889ab290b2503bb17b8faf0_JaffaCakes118
Size
390KB
MD5
c8c360d07889ab290b2503bb17b8faf0
SHA1
1fab8ccacc92b704d9ef4020b2afe596ee92d0df
SHA256
5f9b1fe6ead5735fd89faf768d5a2c0ca622b1d44c471aa5362bbb8ead87bd1a
SHA512
65957300b1ef929e145d1651f56e10e9f35e73f2268b68f8c1d3351d442767c32b173328d9aa26d7f6ab6677f196a804b119417f25e9b19e332f8a81ec7ba00d
SSDEEP
12288:YBteat+iu0k8EHFqtrVuHu4X2RWITUa/fk:nat+ik8drVVTUa/fk
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\FogBugzBuild\Builds\19384\TFS\eeLogs\DEVEL\Bin\Release\eeLogCollector.pdb
eeCloseLog
eeReconfigLog
eeLogQueryStatus
eeQueryLog
GetTempPathW
GetCurrentProcessId
FindNextFileW
lstrcpynW
CompareFileTime
ReadFile
LoadLibraryW
TzSpecificLocalTimeToSystemTime
InitializeCriticalSection
GetCurrentThread
ResetEvent
CreateEventW
CreateThread
GetWindowsDirectoryW
GetDiskFreeSpaceExW
GetSystemTimeAsFileTime
FileTimeToDosDateTime
DeleteFileW
GetSystemTime
MoveFileW
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
WideCharToMultiByte
LoadLibraryExA
LCMapStringW
GetConsoleCP
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetModuleFileNameW
GetStringTypeW
GetFileType
GetACP
GetModuleHandleExW
ExitProcess
GetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetStartupInfoW
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
SetEvent
InitializeCriticalSectionAndSpinCount
SetFilePointer
WriteFile
SystemTimeToTzSpecificLocalTime
GetTimeFormatW
GetDateFormatW
GetLocalTime
GetCurrentProcess
LocalAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
FormatMessageW
LocalFree
CreateDirectoryW
GetFileSize
CreateFileW
GetVersionExW
lstrcmpW
GlobalAlloc
MulDiv
GlobalLock
GlobalUnlock
VirtualFree
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
DecodePointer
LoadLibraryExW
MultiByteToWideChar
FreeLibrary
GetFullPathNameW
InitializeCriticalSectionEx
DeleteCriticalSection
RaiseException
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
SetLastError
SystemTimeToFileTime
ReleaseMutex
WaitForSingleObject
CloseHandle
CreateMutexW
OpenMutexW
FindFirstFileW
GetLastError
FindClose
lstrcmpiW
GetModuleHandleW
GetProcAddress
lstrlenW
CompareStringW
VerSetConditionMask
VerifyVersionInfoW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
GetCurrentDirectoryW
FlushFileBuffers
WriteConsoleW
GetDriveTypeW
SetEndOfFile
SetCursor
GetSystemMetrics
CreateDialogParamW
BeginPaint
EndPaint
IsChild
GetFocus
SetFocus
GetSysColor
RedrawWindow
GetClassInfoExW
DestroyWindow
CreateAcceleratorTableW
GetSystemMenu
EnableScrollBar
ShowScrollBar
KillTimer
AppendMenuW
SetDlgItemTextW
DestroyMenu
IsWindowVisible
UpdateWindow
PtInRect
GetCursorPos
GetCapture
TrackMouseEvent
DrawFocusRect
IsWindowEnabled
GetDCEx
GetScrollPos
GetSysColorBrush
TrackPopupMenu
CreatePopupMenu
MonitorFromPoint
MsgWaitForMultipleObjects
GetDlgCtrlID
LoadImageW
PostQuitMessage
EnableWindow
ClientToScreen
ScreenToClient
MoveWindow
SetCapture
ReleaseCapture
FillRect
InvalidateRgn
CallWindowProcW
InvalidateRect
GetDesktopWindow
DestroyAcceleratorTable
RegisterClassExW
DefWindowProcW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
LoadStringW
MessageBoxW
DialogBoxParamW
UnregisterClassW
GetActiveWindow
ShowWindow
IsIconic
SetForegroundWindow
EnumWindows
SendMessageTimeoutW
GetClassNameW
LoadCursorW
SystemParametersInfoW
CreateWindowExW
GetWindowTextLengthW
GetWindowTextW
CharNextW
SetWindowLongW
EndDialog
SetWindowTextW
GetDlgItem
GetDC
ReleaseDC
DrawTextW
OffsetRect
IsWindow
SendMessageW
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
RegisterWindowMessageW
SetRectEmpty
SetTimer
AllocateAndInitializeSid
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
FreeSid
LogonUserW
DuplicateToken
CheckTokenMembership
OpenThreadToken
ImpersonateLoggedOnUser
SetThreadToken
RevertToSelf
ControlTraceW
QueryAllTracesW
CreateStreamOnHGlobal
OleLockRunning
StringFromGUID2
OleUninitialize
CLSIDFromProgID
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CLSIDFromString
CoGetClassObject
OleInitialize
CoUninitialize
CoInitialize
ShellExecuteW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFolderPathW
VarDecCmp
VarDecFromStr
VarR8FromStr
VarI4FromStr
VarDateFromStr
SysAllocStringLen
VariantInit
VariantClear
LoadTypeLi
LoadRegTypeLi
SysStringLen
OleCreateFontIndirect
SysAllocString
SysFreeString
VarUI4FromStr
StrFormatByteSizeW
PathSetDlgItemPathW
PathIsUNCW
ImageList_GetIconSize
InitCommonControlsEx
DeleteDC
CreateFontIndirectW
GetObjectW
DeleteObject
GetStockObject
GetDeviceCaps
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
GetTextExtentPoint32W
SetTextColor
SetBkMode
CreatePen
LineTo
MoveToEx
SetROP2
Polygon
SelectObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ