Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
d2f2542f827a37b37c6e734a09b4467a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2f2542f827a37b37c6e734a09b4467a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d2f2542f827a37b37c6e734a09b4467a_JaffaCakes118
Size
1.6MB
MD5
d2f2542f827a37b37c6e734a09b4467a
SHA1
695e5b08cb86b7736fb29162f10a094f47779b46
SHA256
60502bede665c05d50b618209815acb89fc40faed5ae03b45574876ee0c3601f
SHA512
05b90dc91704162f9d73b8012cd8932109048ea8124990c9f79c5c51dea68ed4c7e09e755d864d6a5eca60a031eca0f7ace695fc5be207efa7781c3d5b4677f6
SSDEEP
49152:it2No3u+kvvJuwUIU/trJVxVNHhHZJy0zy1H:xo3u+GaIU/FjxbhHO0zyZ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\PC\source\repos\MFCEXE\Release\MFCEXE.pdb
GetVolumeInformationA
GetOEMCP
GetCPInfo
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesExA
SystemTimeToTzSpecificLocalTime
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
WriteConsoleW
SetFilePointerEx
GetConsoleCP
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetStringTypeW
LCMapStringW
CompareStringW
GetFileType
GetStdHandle
HeapQueryInformation
GetModuleHandleExW
GetCommandLineW
GetCommandLineA
RtlUnwind
OutputDebugStringW
GetFullPathNameA
FlushFileBuffers
FindFirstFileA
FindClose
DeleteFileA
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
GlobalFlags
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSection
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
LoadLibraryA
GetSystemDirectoryW
EncodePointer
GetCurrentProcessId
GlobalAddAtomA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
CompareStringA
lstrcmpA
GlobalDeleteAtom
LoadLibraryExW
GetModuleFileNameA
FreeLibrary
GetVersionExA
GetCurrentThreadId
FindResourceA
FreeResource
FormatMessageA
MulDiv
LocalFree
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
LoadLibraryW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
SetLastError
OutputDebugStringA
GetACP
MultiByteToWideChar
UnmapViewOfFile
FileTimeToSystemTime
GetFileAttributesA
CreateDirectoryA
GetCurrentDirectoryA
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
SetFilePointer
ReadFile
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
DecodePointer
WideCharToMultiByte
SetPriorityClass
SetFileAttributesA
CreateFileA
FindResourceW
lstrlenW
WinExec
CloseHandle
WriteFile
SizeofResource
LoadResource
Sleep
SetThreadPriority
GetCurrentThread
CreateFileW
ExitProcess
GetCurrentProcess
GetConsoleMode
LockResource
LoadIconA
GetWindow
GetTopWindow
GetClassNameA
GetClassLongA
SetWindowLongA
PtInRect
CopyRect
MapWindowPoints
AdjustWindowRectEx
GetWindowRect
GetWindowTextA
RemovePropA
GetPropA
SetPropA
GetScrollPos
RedrawWindow
SetForegroundWindow
GetForegroundWindow
UpdateWindow
SetMenu
GetMenu
GetCapture
SetFocus
GetDlgCtrlID
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPos
IsChild
IsMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
CallWindowProcA
DefWindowProcA
GetMessageTime
GetMessagePos
RegisterWindowMessageA
GetSysColor
ScreenToClient
ClientToScreen
EndPaint
BeginPaint
ReleaseDC
IsDialogMessageA
TabbedTextOutA
GrayStringA
DrawTextExA
DrawTextA
UnhookWindowsHookEx
SendMessageA
IsIconic
EnableWindow
GetSystemMetrics
GetLastActivePopup
GetWindowThreadProcessId
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
CallNextHookEx
SetWindowsHookExA
GetCursorPos
ValidateRect
GetKeyState
IsWindowVisible
PeekMessageA
DispatchMessageA
TranslateMessage
GetMessageA
WinHelpA
MonitorFromWindow
GetMonitorInfoA
ShowWindow
CreateWindowExA
SetWindowTextA
DrawIcon
GetClientRect
LoadIconW
UnregisterClassA
wsprintfA
GetDesktopWindow
SendDlgItemMessageA
SetRectEmpty
OffsetRect
GetParent
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetFocus
CheckMenuItem
EnableMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
SetMenuItemInfoA
LoadBitmapW
IsWindow
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetDlgItem
GetNextDlgTabItem
GetActiveWindow
IsWindowEnabled
GetSysColorBrush
LoadCursorA
RealChildWindowFromPoint
SetTimer
KillTimer
CharUpperA
DestroyMenu
SetActiveWindow
GetWindowLongA
GetDC
InvalidateRect
GetStockObject
PtVisible
RectVisible
RestoreDC
SaveDC
SelectObject
SetBkColor
SetMapMode
SetTextColor
GetObjectA
TextOutA
ExtTextOutA
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetClipBox
Escape
DeleteObject
CreateBitmap
GetDeviceCaps
DeleteDC
OpenPrinterA
ClosePrinter
DocumentPropertiesA
RegEnumValueA
RegQueryValueA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
RegCloseKey
SHChangeNotify
ShellExecuteA
PathFindFileNameA
PathIsUNCA
PathStripToRootA
PathFindExtensionA
CoCreateInstance
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateGuid
VariantChangeType
VariantClear
VariantInit
SysAllocStringLen
SysFreeString
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
InternetOpenA
CreateStdAccessibleObject
LresultFromObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ