Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
cf323b787ef5e547e9e1add62854fb5d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf323b787ef5e547e9e1add62854fb5d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
cf323b787ef5e547e9e1add62854fb5d_JaffaCakes118
Size
648KB
MD5
cf323b787ef5e547e9e1add62854fb5d
SHA1
392a2b75a6c2afcb0f3e0ada73b69d2be706e653
SHA256
4069657a53af5b4a248c226c0955e59e495cbdc3cadc899c2e58eeeaa67a9aaf
SHA512
c070a1a42c0c3769d797467f18ac5d060ca83739d9ca9cec2545041207d2069f6453ccbfaba6e985b91441bbc850ff568c32b31258a1bf7e3b3310dbe365c25d
SSDEEP
12288:2R9fUUnA/1+W0Un4CzCnZw+2ZhBW3I4nCis3ic1sJd50CPDQ1Ty:S8U47r4+CZwlBl4n43ic6Jd508Di+
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
C:\DistributedAutoLink\Temp\Setup.exe_N12203Release\setup\setupexe\CompileOutputDir\Setup.pdb
GetCurrentProcess
GetVersionExA
SetCurrentDirectoryA
InterlockedIncrement
lstrcatA
lstrcpyA
WinExec
CreateProcessA
GetExitCodeProcess
WaitForSingleObject
GetShortPathNameA
GetDriveTypeA
GetLogicalDriveStringsA
GetSystemDirectoryA
LocalFree
LocalAlloc
CreateThread
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
ResumeThread
SetThreadPriority
SuspendThread
GetDiskFreeSpaceA
MultiByteToWideChar
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
ReleaseMutex
CreateMutexA
GetCommandLineA
TerminateProcess
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
IsDBCSLeadByte
OpenMutexA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
CreateDirectoryA
SetStdHandle
FlushFileBuffers
IsValidCodePage
IsValidLocale
lstrcmpA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
IsBadCodePtr
IsBadReadPtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
TlsAlloc
HeapSize
IsBadWritePtr
FatalAppExitA
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapReAlloc
ExitProcess
GetSystemTimeAsFileTime
RtlUnwind
QueryPerformanceCounter
QueryPerformanceFrequency
GetTempPathA
SetEndOfFile
GetFileAttributesA
FindClose
GetTickCount
OutputDebugStringA
GetCurrentProcessId
GetFileSize
lstrcpynA
SetFileAttributesA
DeleteFileA
MoveFileA
SetFilePointer
GetVersion
MoveFileExA
CopyFileA
Sleep
WideCharToMultiByte
lstrcmpiA
SetLastError
FindNextFileA
RemoveDirectoryA
EnumSystemLocalesA
FindFirstFileA
lstrlenW
GetLocalTime
GetCurrentThreadId
LoadLibraryA
GetModuleFileNameA
FreeLibrary
InterlockedDecrement
WritePrivateProfileStringA
GetPrivateProfileIntA
GetWindowsDirectoryA
WritePrivateProfileSectionA
GetPrivateProfileStringA
WriteFile
ReadFile
CreateFileA
CloseHandle
lstrlenA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetLastError
GetProcessHeap
HeapAlloc
GetModuleHandleA
GetProcAddress
SetConsoleCtrlHandler
HeapFree
DefWindowProcA
DialogBoxParamA
UnregisterClassA
CharNextA
CharUpperA
CallNextHookEx
IsDialogMessageA
wsprintfW
IsWindowEnabled
RedrawWindow
ExitWindowsEx
EnableMenuItem
GetSystemMenu
GetSystemMetrics
GetCursorPos
PeekMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
InvalidateRect
GetFocus
EndDialog
GetWindowTextA
DestroyWindow
PostQuitMessage
IsDlgButtonChecked
CheckDlgButton
GetMessageA
ReleaseDC
GetDC
ScreenToClient
LoadBitmapA
SetFocus
SetForegroundWindow
EnableWindow
KillTimer
SetTimer
IsWindowVisible
SetWindowTextA
DestroyIcon
CreateDialogParamA
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
GetDlgItem
GetParent
SetDlgItemTextA
ShowWindow
GetWindowLongA
SetWindowLongA
wvsprintfA
LoadImageA
PostMessageA
CharLowerA
LoadStringA
FindWindowA
SendMessageA
wsprintfA
UnhookWindowsHookEx
SetWindowsHookExA
GetActiveWindow
IsWindow
CreateCompatibleBitmap
BitBlt
DeleteDC
CreateCompatibleDC
GetObjectA
DeleteObject
GetTextExtentPoint32A
CreateFontIndirectA
SelectObject
CreateSolidBrush
GetSaveFileNameA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetFileSecurityA
SetFileSecurityA
RegOpenKeyA
LookupAccountNameA
RegQueryInfoKeyA
RegGetKeySecurity
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAce
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
RegSetKeySecurity
RegQueryValueA
RegCreateKeyExA
RegEnumKeyExA
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueA
SHBrowseForFolderA
ShellExecuteExA
ShellExecuteA
Shell_NotifyIconA
SHGetPathFromIDListA
SHGetMalloc
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
GetErrorInfo
CreateErrorInfo
VariantChangeType
SetErrorInfo
VariantClear
VariantInit
SysAllocString
SysFreeString
VarUI4FromStr
PathSkipRootA
PathFileExistsA
ImageList_AddMasked
ImageList_Create
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE