Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Behavioral task
behavioral1
Sample
d199468856457236221f132c8a222a1d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d199468856457236221f132c8a222a1d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d199468856457236221f132c8a222a1d_JaffaCakes118
Size
847KB
MD5
d199468856457236221f132c8a222a1d
SHA1
46175338a3811c81f463ee207e77de0992eec6d6
SHA256
73a6f060f3e62c8067e29563a1d27f2419d760a4f1a7ffc1579e307f5f4a58f1
SHA512
6b71909cffea12998d3a184d169ecdab2b335326734011cd93e1179da77cba7e418672838d595cc0b6a79e72373cf9c6c7a124a7a952fdb96e2cc069dc405b71
SSDEEP
12288:/DOwdkK6+z4jmsLzvTEMJJ6krKxtpJiHvuIuntDrM5foi:/DpuiQmsfvHJzK3pJiHvV5foi
metasploit
encoder/shikata_ga_nai
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\src\ProcExp\exe\x64\Release\procexp.pdb
getservbyport
WSAStartup
htons
ntohs
ntohl
gethostbyaddr
htonl
WNetGetConnectionA
CreateToolbarEx
CreatePropertySheetPageA
ord6
PropertySheetA
ord17
ImageList_Create
ImageList_ReplaceIcon
ImageList_DrawEx
ImageList_Destroy
InitCommonControlsEx
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
CredUIPromptForCredentialsA
LoadResource
FindResourceA
CreateFileA
SetLastError
GetCommandLineW
CreateEventA
OpenEventA
GetTickCount
lstrcatA
HeapFree
lstrcpyA
HeapAlloc
GetProcessHeap
GetDateFormatA
ReadProcessMemory
lstrcmpA
lstrcmpiA
GetEnvironmentVariableA
MulDiv
CreateProcessA
ExpandEnvironmentStringsA
SearchPathA
GetFileAttributesA
GetNumberFormatA
lstrcpynA
GetSystemDirectoryA
VirtualQueryEx
OpenProcess
SetFilePointer
ReadFile
QueryPerformanceFrequency
QueryPerformanceCounter
ResetEvent
LoadLibraryW
UnmapViewOfFile
IsBadReadPtr
MapViewOfFile
CreateFileMappingA
PulseEvent
GlobalMemoryStatus
WaitForMultipleObjects
SetErrorMode
GetCurrentProcessId
TerminateProcess
SetPriorityClass
FindClose
FindFirstFileA
SetEnvironmentVariableA
GlobalUnlock
GlobalAlloc
GlobalLock
GlobalReAlloc
DeleteFileA
SetProcessWorkingSetSize
GetLocaleInfoA
GetComputerNameW
SizeofResource
IsWow64Process
GetProcessId
Sleep
DeviceIoControl
GetDriveTypeA
GetCurrentDirectoryA
GetFileTime
GetExitCodeThread
DuplicateHandle
GetCurrentThread
GetProcessAffinityMask
VirtualFree
VirtualAlloc
GetThreadContext
GetProcessWorkingSetSize
MultiByteToWideChar
GlobalAddAtomA
GetSystemInfo
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetFileType
SetHandleCount
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
FlsAlloc
FlsFree
FlsSetValue
FlsGetValue
DecodePointer
EncodePointer
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleW
HeapCreate
HeapSetInformation
GetStartupInfoA
GetCommandLineA
ResumeThread
CreateThread
GetCurrentThreadId
ExitThread
RtlUnwindEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlPcToFileHeader
HeapReAlloc
RaiseException
LockResource
GetCurrentProcess
IsBadStringPtrA
lstrlenA
InitializeCriticalSection
GetSystemTimeAsFileTime
DeleteCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeFormatA
EnterCriticalSection
LeaveCriticalSection
SetEvent
GetModuleHandleA
WaitForSingleObject
TerminateThread
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
CreateToolhelp32Snapshot
Module32First
CloseHandle
Module32Next
GetVersion
FreeLibrary
LoadLibraryA
GetProcAddress
GetLastError
LocalFree
LocalAlloc
GetModuleFileNameA
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
FormatMessageA
GetEnvironmentStringsW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
DrawMenuBar
RemoveMenu
CreateMenu
RegisterWindowMessageA
GetDesktopWindow
GetDlgCtrlID
SendMessageTimeoutA
GetWindow
GetUserObjectSecurity
SetUserObjectSecurity
GetKeyState
CheckRadioButton
MsgWaitForMultipleObjects
PeekMessageA
ScrollWindowEx
SetScrollInfo
GetScrollInfo
IntersectRect
GetClassLongPtrA
GetUpdateRgn
ReleaseCapture
GetDlgItemTextA
CheckMenuRadioItem
CheckMenuItem
PostQuitMessage
DrawIconEx
LoadMenuA
InsertMenuA
TrackPopupMenu
GetCapture
ExitWindowsEx
DrawEdge
wsprintfA
ShowWindowAsync
SetForegroundWindow
FindWindowExA
IsIconic
GetWindowDC
SetMenuItemInfoA
SetClassLongA
FillRect
EnumWindows
GetWindowThreadProcessId
GetWindowTextA
DeleteMenu
EnableWindow
CheckDlgButton
IsDlgButtonChecked
GetWindowPlacement
ModifyMenuA
CreatePopupMenu
AppendMenuA
TrackPopupMenuEx
GetMenu
GetSubMenu
GetMenuItemCount
GetMenuItemID
EnableMenuItem
DestroyIcon
FrameRect
GetDoubleClickTime
InvalidateRgn
MessageBoxA
SetFocus
WindowFromPoint
RedrawWindow
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
IsDialogMessageA
TranslateMessage
DispatchMessageA
SetCapture
CreateDialogParamA
KillTimer
LoadStringA
LoadIconA
LoadImageA
RegisterClassExA
RegisterClassA
FindWindowA
SetWindowPlacement
UpdateWindow
DialogBoxIndirectParamA
SetWindowTextA
InflateRect
DefFrameProcA
DefMDIChildProcA
DefDlgProcA
ClientToScreen
SystemParametersInfoA
CreateIconIndirect
MapWindowPoints
DestroyWindow
CreateWindowExA
IsWindowVisible
GetFocus
DrawTextA
GetDC
ReleaseDC
PostMessageA
SendMessageA
ShowWindow
GetCursorPos
SetWindowPos
SetWindowLongA
IsZoomed
PtInRect
BeginPaint
EndPaint
DrawFrameControl
CallWindowProcA
CopyRect
GetWindowLongPtrA
SetWindowLongPtrA
SetPropA
GetPropA
BeginDeferWindowPos
EnumChildWindows
EndDeferWindowPos
GetClientRect
GetSystemMetrics
OffsetRect
UnionRect
GetParent
GetClassNameA
GetWindowLongA
DeferWindowPos
ScreenToClient
DefWindowProcA
DialogBoxParamA
EndDialog
ChildWindowFromPoint
GetDlgItem
InvalidateRect
SetCursor
GetSysColorBrush
GetSysColor
GetWindowRect
MoveWindow
SetDlgItemTextA
LoadCursorA
SetTimer
SetTextColor
SelectObject
CreateCompatibleBitmap
LineTo
MoveToEx
GetTextMetricsA
Polyline
GetBkColor
SelectClipRgn
CreateRectRgnIndirect
RectInRegion
CreateRectRgn
SaveDC
SetROP2
CreatePen
Rectangle
GetStockObject
GetObjectA
SetTextAlign
CreateFontIndirectA
ExtTextOutA
GetTextExtentPoint32A
CreateSolidBrush
GetDeviceCaps
SetMapMode
StartDocA
StartPage
EndPage
EndDoc
SetBkColor
BitBlt
CreateDIBSection
CreateCompatibleDC
DeleteDC
DeleteObject
SetBkMode
RestoreDC
ChooseFontA
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
FindTextA
PrintDlgA
SHGetMalloc
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
Shell_NotifyIconA
ShellExecuteA
SHGetFileInfoA
CoCreateInstance
CoInitialize
CoUninitialize
CoSetProxyBlanket
SysFreeString
VariantClear
VariantInit
SafeArrayGetElement
VariantChangeType
SafeArrayDestroy
SysStringLen
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocStringByteLen
SysAllocStringLen
SysAllocString
SafeArrayUnaccessData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ