Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
d52154a047eea86b1b3cce965fbb1c22_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d52154a047eea86b1b3cce965fbb1c22_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d52154a047eea86b1b3cce965fbb1c22_JaffaCakes118
Size
1.4MB
MD5
d52154a047eea86b1b3cce965fbb1c22
SHA1
4bf6870e4585cc56190f48b57808998714bbfa48
SHA256
2f0d705089e361ec8ae2156350935c7c8a0fed0229068c993099c852ae4eb9b2
SHA512
306e72c0b3c8ef059a8eca9caf7924404eb231f1862732a310265644350ea7cd4894d5e24a56e51c4af9565fc1a5c22aff279c536f02ecb7f32b7d69e6649e74
SSDEEP
24576:AzW+WbC8j3EPk2OdzY8/RjRL8hDL+Rmw9YEb9/XksOPbw8SWnwezTzS+Wr1t/Kez:GzWu8hZRLbRmwLUns+Yt/KeC5UmRCR
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\dev\bNetworks\Projects\Sources\JoinerEx\Source\Starter\Release\Starter.pdb
CreateFileA
LockResource
SizeofResource
LoadResource
FindResourceA
GetTempPathA
GetModuleHandleA
WaitForMultipleObjects
WaitForSingleObject
CreateProcessA
ExitProcess
LoadLibraryA
MultiByteToWideChar
SetStdHandle
GetSystemInfo
VirtualProtect
IsBadCodePtr
SetUnhandledExceptionFilter
SetFilePointer
GetStringTypeW
GetSystemDirectoryA
LCMapStringW
LCMapStringA
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
HeapSize
GetCurrentProcess
TerminateProcess
GetProcAddress
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
VirtualQuery
GetModuleFileNameA
CreateDirectoryA
WriteFile
CloseHandle
InterlockedExchange
DeleteCriticalSection
InitializeCriticalSection
GetVersionExA
GetLocaleInfoA
GetACP
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
RtlUnwind
HeapFree
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
GetOEMCP
GetCPInfo
FlushFileBuffers
IsDlgButtonChecked
MessageBoxA
GetDlgItemTextA
DialogBoxParamA
GetWindowRect
InvalidateRect
GetWindowTextA
GetClientRect
BeginPaint
IsWindowEnabled
GetSysColor
DrawTextA
SetWindowPos
EndPaint
GetWindowLongA
SetWindowLongA
CallWindowProcA
GetDlgCtrlID
GetParent
LoadCursorA
SetCursor
GetSystemMetrics
LoadImageA
SendMessageA
SetWindowTextA
SendDlgItemMessageA
GetDlgItem
ShowWindow
CheckDlgButton
SetDlgItemTextA
EndDialog
GetObjectA
CreateFontIndirectA
SelectObject
SetTextColor
DeleteObject
GetStockObject
SetBkMode
RegOpenKeyExA
RegSetValueExA
RegCloseKey
SHGetSpecialFolderPathA
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ