Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ce0662a401c6a7ee6bee8b26f5f65cc3_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ce0662a401c6a7ee6bee8b26f5f65cc3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
ce0662a401c6a7ee6bee8b26f5f65cc3_JaffaCakes118
Size
504KB
MD5
ce0662a401c6a7ee6bee8b26f5f65cc3
SHA1
d0e1633acb16227df818d9eb329dbbf7335c1393
SHA256
c0ba0d2b751bca68ebfcf2040925ae96cd480791cf52a17079dd260f4ffdabb9
SHA512
d87d213d15c44cb80273eb691ed9601e18a1519f248ebc93690898bd9d1a4165948eed0a73540ab9c339f5728f6c09c48529d2f46c5224847a4c8657505e5168
SSDEEP
12288:mM6XFpLh1Pr9hOR9QcIxX/fqc7gvKrsoyr9U:mhXzTD9hORn6/uvyy
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\src\Client\BundleInstall\SmallStandalone\BundleInstall.pdb
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
InternetCloseHandle
InternetReadFile
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetGetConnectedState
HttpQueryInfoA
HttpSendRequestA
ord17
listen
setsockopt
closesocket
shutdown
bind
gethostbyname
htons
socket
accept
send
WSAGetLastError
__WSAFDIsSet
select
recv
WSASetLastError
WSAStartup
ioctlsocket
connect
GetStartupInfoA
GetCurrentProcess
GetSystemDirectoryA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetModuleFileNameA
WideCharToMultiByte
GetSystemTimeAsFileTime
Sleep
CreateDirectoryA
RemoveDirectoryA
SetEvent
OpenEventA
GetVolumeInformationA
GetVersionExA
GetUserDefaultLangID
GetWindowsDirectoryA
SetFileAttributesA
GetFileAttributesA
WriteFile
GetTempPathA
WritePrivateProfileStringA
FreeLibrary
GetProcAddress
LoadLibraryA
WaitForSingleObject
CreateProcessA
lstrcmpiA
ReadFile
CompareFileTime
GetTimeZoneInformation
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
GetLastError
FindClose
FindNextFileA
FindFirstFileA
HeapFree
HeapAlloc
GetProcessHeap
GetLocalTime
OutputDebugStringA
EnterCriticalSection
LeaveCriticalSection
CopyFileA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetEndOfFile
SetConsoleCtrlHandler
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetSystemInfo
VirtualProtect
VirtualQuery
GetOEMCP
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsW
CloseHandle
DeleteFileA
GetTickCount
GetTempFileNameA
GetModuleHandleA
CreateFileA
HeapSize
SetStdHandle
GetFileType
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
FileTimeToLocalFileTime
GetFileInformationByHandle
MoveFileExA
PeekNamedPipe
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
TerminateProcess
HeapReAlloc
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
SetLastError
FindFirstFileW
DeleteFileW
FindNextFileW
LocalFree
LocalAlloc
OpenProcess
WaitForMultipleObjects
ResetEvent
ReleaseMutex
ReleaseSemaphore
CreateEventA
CreateMutexA
OpenMutexA
CreateSemaphoreA
QueryPerformanceFrequency
QueryPerformanceCounter
SystemTimeToFileTime
FileTimeToSystemTime
GetSystemTime
GetDateFormatA
GetTimeFormatA
UnmapViewOfFile
GetComputerNameA
GetCurrentProcessId
MapViewOfFile
CreateFileMappingA
GetVersion
GetShortPathNameA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
FormatMessageA
GetModuleFileNameW
LoadLibraryExA
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFilePointer
InterlockedExchange
MultiByteToWideChar
lstrlenA
ExitProcess
RtlUnwind
RaiseException
FlushFileBuffers
SetFileTime
LocalFileTimeToFileTime
ExitThread
GetCurrentThreadId
CreateThread
GetCommandLineA
LCMapStringA
LCMapStringW
GetCPInfo
FatalAppExitA
TlsAlloc
VirtualFree
DispatchMessageA
GetSystemMetrics
LoadImageA
ExitWindowsEx
SetForegroundWindow
KillTimer
GetClientRect
SetWindowTextA
PostMessageA
SetWindowPos
LoadStringA
PostQuitMessage
GetDesktopWindow
GetWindowRect
MoveWindow
DestroyWindow
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
GetMessageA
TranslateAcceleratorA
TranslateMessage
GetDC
ReleaseDC
LoadMenuA
AllocateAndInitializeSid
EqualSid
FreeSid
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
SetSecurityInfo
SetFileSecurityA
IsValidSid
RegEnumKeyA
RegEnumValueA
GetSidSubAuthorityCount
GetSidSubAuthority
SetTokenInformation
RegEnumKeyExA
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegCreateKeyExA
RegDeleteKeyA
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegSetKeySecurity
RegSaveKeyA
RegFlushKey
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
DuplicateTokenEx
CreateProcessAsUserA
GetTokenInformation
OleInitialize
CoTaskMemFree
StringFromGUID2
OleRun
CoCreateInstance
CreateErrorInfo
VariantClear
VariantInit
SysFreeString
LoadTypeLi
DispGetIDsOfNames
VariantChangeType
SysAllocString
GetErrorInfo
SetErrorInfo
SHCopyKeyA
GetDeviceCaps
SHGetSpecialFolderPathA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ