Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
d5134f77ca508e33eace820c4877e6c0_JaffaCakes118.exe
Resource
win7-20240903-en
Target
d5134f77ca508e33eace820c4877e6c0_JaffaCakes118
Size
918KB
MD5
d5134f77ca508e33eace820c4877e6c0
SHA1
95f1d5ee8c95b24ffb62d61d597ac1e1c5e44b31
SHA256
c3cba8b38b1c9d930d6352803848798e6e9b8ef37e52523b97d5b94dd52fc732
SHA512
c161ecd58dcab38a338e548ca04d3c9bb959c6b235edb2bb08caec87bfdd292bd7e667e7f3679388147ba08c4233456f40c8083581daff26758ce5872f24850d
SSDEEP
6144:x3bDksaZLLP8OvtzpfzzlPFAAfwG44X0m+Z1Af61g8nKB17M1hRJZ:VvksaZLwOvTzRP6Af44ajACi8Kr7M1j
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetVersion
LoadLibraryA
VirtualAlloc
VirtualFree
VirtualProtect
GetModuleHandleA
GetTickCount
GetSystemTimeAsFileTime
GetConsoleTitleA
GetTempFileNameW
LZCopy
FindNextFileA
GetThreadLocale
InterlockedPushEntrySList
CreateActCtxA
GetTapeStatus
MapUserPhysicalPagesScatter
SetInformationJobObject
FindNextVolumeW
GetAsyncKeyState
GetUpdateRgn
GetClipCursor
GetInputDesktop
DrawCaption
CloseClipboard
IsWindowVisible
CopyAcceleratorTableA
DdeCmpStringHandles
GetKeyboardState
DdeDisconnectList
RegisterClipboardFormatA
SetWindowsHookA
ReplyMessage
GetAltTabInfoA
GetAltTabInfoW
DrawStateW
GetWindowPlacement
GetKeyboardLayout
CreateDialogIndirectParamA
MessageBoxW
GetKeyboardType
WINNLSEnableIME
CsrBroadcastSystemMessageExW
GetKeyState
OemToCharBuffW
MsgWaitForMultipleObjects
PackDDElParam
LoadMenuIndirectW
BroadcastSystemMessage
GetMouseMovePointsEx
DrawTextExA
ValidateRgn
StrChrIA
SHCreateFileExtractIconW
StrStrA
SHGetSetSettings
SHGetDesktopFolder
SHGetNewLinkInfo
ILAppendID
PifMgr_SetProperties
SHFreeNameMappings
ILIsEqual
StrNCmpIA
DAD_AutoScroll
IsLFNDriveA
SHCreateQueryCancelAutoPlayMoniker
DAD_SetDragImage
ExtractAssociatedIconExW
PathYetAnotherMakeUniqueName
SHOpenFolderAndSelectItems
ShellExecuteEx
Control_RunDLLA
SHGetDiskFreeSpaceA
SHGetFolderPathA
RealShellExecuteA
IsNetDrive
SHFileOperationA
SHGetIconOverlayIndexA
SHChangeNotification_Unlock
StrRChrW
SHPropStgCreate
UninitializeFlatSB
FlatSB_GetScrollProp
DestroyPropertySheetPage
SetWindowSubclass
ImageList_SetIconSize
ImageList_SetFilter
ImageList_DrawEx
ImageList_Replace
CreatePropertySheetPageW
ImageList_DrawIndirect
ImageList_GetIconSize
ImageList_GetImageCount
DPA_Sort
CreateStatusWindowW
ImageList_Draw
CreateUpDownControl
CreateStatusWindowA
CreateToolbarEx
FlatSB_GetScrollPos
DSA_Destroy
GetEffectiveClientRect
FlatSB_SetScrollRange
DrawStatusTextW
ImageList_GetImageRect
FlatSB_SetScrollInfo
AddMRUStringW
VarMod
VarAnd
VarSub
VARIANT_UserSize
VarBoolFromI1
VarOr
VarBoolFromI2
VarI8FromI1
GetActiveObject
DllGetClassObject
VarI2FromI1
OaBuildVersion
VarR4CmpR8
BSTR_UserFree
DllRegisterServer
VariantCopyInd
VarI1FromCy
VarR8FromDec
GetAltMonthNames
VarCyNeg
VarDateFromUI1
VarDecFromI2
LHashValOfNameSysA
OleCreateFontIndirect
SysFreeString
VarDecFromR4
VarBstrFromUI4
VarCyFromStr
BstrFromVector
DocumentPropertiesA
QueryColorProfile
ConnectToPrinterDlg
AddPrinterDriverW
DeletePrinterDataA
FlushPrinter
PrinterMessageBoxA
EnumJobsW
EnumFormsA
DeleteMonitorA
AddFormW
EnumMonitorsA
EnumPrinterKeyW
GetPrinterW
AbortPrinter
PerfOpen
PerfClose
GetPrinterDriverDirectoryA
DeletePrinterIC
EnumPrintersW
GetPrintProcessorDirectoryA
AdvancedDocumentPropertiesA
GetPrinterDriverDirectoryW
SpoolerPrinterEvent
AddMonitorW
EnumPrinterDataExA
AddPrinterW
EnumPrintProcessorDatatypesW
OpenPrinterW
WmiReceiveNotificationsA
FileEncryptionStatusW
UpdateTraceA
FindFirstFreeAce
InitiateSystemShutdownW
UnregisterIdleTask
SaferiIsExecutableFileType
RegQueryMultipleValuesA
SystemFunction003
RegisterEventSourceW
RegSaveKeyExW
GetTrusteeFormW
SaferGetLevelInformation
InitializeSecurityDescriptor
ConvertSecurityDescriptorToAccessW
RegQueryValueExW
RegDisablePredefinedCacheEx
CredReadA
RegNotifyChangeKeyValue
WmiExecuteMethodA
CryptImportKey
ClearEventLogA
LookupSecurityDescriptorPartsW
ConvertSecurityDescriptorToAccessNamedA
CredEnumerateA
SystemFunction028
ElfBackupEventLogFileW
DeregisterEventSource
LsaSetQuotasForAccount
ConvertAccessToSecurityDescriptorA
CryptSetProviderExA
ConvertSecurityDescriptorToStringSecurityDescriptorA
BuildTrusteeWithObjectsAndSidW
RegQueryValueExA
ObjectOpenAuditAlarmA
GetWindowsAccountDomainSid
SetEntriesInAccessListW
EnumServicesStatusExW
SystemFunction032
AllocateAndInitializeSid
CredGetTargetInfoW
LsaSetSystemAccessAccount
mmioFlush
waveInGetDevCapsA
mciLoadCommandResource
mci32Message
waveOutPause
midiOutLongMsg
mixerMessage
midiInStop
waveOutBreakLoop
mmioInstallIOProcW
DefDriverProc
mmioCreateChunk
mixerGetDevCapsA
auxOutMessage
waveOutGetPitch
mixerOpen
waveInGetID
joySetCapture
wod32Message
midiStreamProperty
waveOutOpen
waveOutGetErrorTextW
midiOutMessage
midiStreamPosition
midiOutSetVolume
joyGetThreshold
mciGetDriverData
waveInReset
midiOutCacheDrumPatches
waveInGetNumDevs
mixerGetControlDetailsW
PlaySound
midiStreamClose
sndPlaySoundA
mixerGetNumDevs
SymGetLineFromName
SymUnloadModule64
SymGetModuleInfo64
SymEnumerateModules
ImageRvaToVa
UnDecorateSymbolName
SymLoadModule
ImageLoad
EnumerateLoadedModules64
TouchFileTimes
FindFileInSearchPath
SearchTreeForFile
SymSetOptions
SymGetSymFromName
FindDebugInfoFile
ImageNtHeader
ImageRvaToSection
ImagehlpApiVersionEx
MapAndLoad
SymMatchFileName
ImagehlpApiVersion
SymGetLinePrev64
ReBaseImage
GetImageConfigInformation
GetTimestampForLoadedLibrary
StackWalk
SymGetModuleInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ