Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d57e4f90f5342581529497bdc67d3f1a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d57e4f90f5342581529497bdc67d3f1a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d57e4f90f5342581529497bdc67d3f1a_JaffaCakes118
Size
128KB
MD5
d57e4f90f5342581529497bdc67d3f1a
SHA1
46ea785eb84073079a498f2789b1c73fe8d5d890
SHA256
a56df055188fc7fb58995da8eb4194f3804cf2a1d9fa9e2a8d589d711d8747e0
SHA512
2ab4beda163320b6a4d4873fae6629c1dbdecfb29ec2fd02c1a75e24db7ce73887b7df41c56adb4ed700bd96b01e6ab850e953119bd11a87813c60c88c3a7cdd
SSDEEP
3072:QJSo/9O6NITW+6N5Xt3NxQ23jM4Pi9CT+6kO:Q4ollNBfNe49+9O
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetConsoleScreenBufferInfo
GetDiskFreeSpaceExW
WriteProfileSectionA
GetConsoleDisplayMode
GetProcessWorkingSetSize
LZClose
ScrollConsoleScreenBufferA
GlobalCompact
GetProcAddress
lstrcatW
ReadConsoleInputW
GetTickCount
LockResource
LZCloseFile
MulDiv
LockFile
LocalShrink
LZInit
GetUserDefaultUILanguage
VerLanguageNameW
HeapCreate
IsBadHugeReadPtr
CreateFileA
MoveFileWithProgressW
DebugActiveProcess
AddConsoleAliasW
QueryActCtxW
SetFirmwareEnvironmentVariableA
EnumerateLocalComputerNamesW
SetConsoleTitleA
CreateTimerQueueTimer
CopyFileExW
LeaveCriticalSection
TransactNamedPipe
BindIoCompletionCallback
FindVolumeClose
GlobalMemoryStatus
EnumResourceTypesW
GetDiskFreeSpaceW
WritePrivateProfileStringA
FindResourceExW
FreeUserPhysicalPages
GlobalLock
GetProcessIoCounters
TransmitCommChar
GetThreadContext
GetConsoleCursorInfo
GetThreadLocale
SetVolumeMountPointW
SetLocaleInfoW
OpenProfileUserMapping
IMPGetIMEW
DialogBoxIndirectParamW
GetAncestor
CheckMenuItem
CharToOemW
DdeQueryStringW
EnumWindowStationsA
IsWindow
VkKeyScanExW
CreateSystemThreads
IsCharAlphaW
LoadImageA
DefFrameProcW
ExcludeUpdateRgn
GetGUIThreadInfo
SetDlgItemTextW
EnumDesktopsW
DdeQueryStringA
SetMenu
FreeDDElParam
ChangeDisplaySettingsW
SetWindowsHookExW
FillRect
GetInputState
GetWindowThreadProcessId
SetParent
GetClassWord
MapVirtualKeyExA
DdeReconnect
SetRect
AdjustWindowRect
CheckMenuRadioItem
GetDoubleClickTime
SwitchDesktop
CreateDialogIndirectParamAorW
PrivateExtractIconsW
UnregisterClassW
EnumWindowStationsW
SetUserObjectSecurity
KillTimer
ModifyMenuW
GetClassNameW
EnumClipboardFormats
GetMenuItemRect
DdeConnectList
GetCursor
GetScrollPos
DdeCreateStringHandleW
HiliteMenuItem
GetClassLongW
UnregisterHotKey
GetWindowLongW
MonitorFromWindow
GrayStringA
InitializeLpkHooks
GetShellWindow
UserHandleGrantAccess
TranslateAcceleratorW
DestroyWindow
RecordShutdownReason
SetCapture
GetAppCompatFlags
GetWindowTextA
SetInternalWindowPos
DrawAnimatedRects
GetPropW
DrawTextExA
MapVirtualKeyA
IsDialogMessageW
GetMenuStringA
CopyRect
SetSysColorsTemp
SetDoubleClickTime
GetClipboardFormatNameW
CopyImage
RegisterUserApiHook
UnhookWindowsHook
CheckRadioButton
LoadMenuIndirectW
GetWindowTextW
DdeClientTransaction
MapDialogRect
LookupIconIdFromDirectoryEx
CalcMenuBar
DrawStateA
IsWinEventHookInstalled
BroadcastSystemMessageExW
GetKeyboardLayout
InSendMessage
GetGlyphIndicesA
GdiEntry15
SetRelAbs
XFORMOBJ_iGetXform
LPtoDP
CloseMetaFile
EngCopyBits
SetTextCharacterExtra
PolyDraw
GetGlyphOutlineW
LineDDA
PlayMetaFileRecord
GdiConvertToDevmodeW
CLIPOBJ_cEnumStart
DeleteColorSpace
SetROP2
FONTOBJ_pQueryGlyphAttrs
PATHOBJ_bEnum
SetDIBits
GetEnhMetaFilePixelFormat
BeginPath
Arc
GetHFONT
GdiCreateLocalMetaFilePict
GetNearestPaletteIndex
CreateDIBSection
GetViewportOrgEx
GetTextFaceAliasW
SelectBrushLocal
OffsetRgn
GdiIsMetaPrintDC
GetROP2
ScaleViewportExtEx
DdEntry40
RemoveFontResourceA
StrCmpNIW
StrChrIA
SHCreateDirectoryExA
PathIsRootW
MenuHelp
ImageList_DrawIndirect
ImageList_Duplicate
ImageList_LoadImageA
GetFileTitleA
ChooseFontW
ReplaceTextW
FindTextA
GetSaveFileNameA
GetSaveFileNameW
GetOpenFileNameW
FindTextW
PrintDlgExW
PageSetupDlgA
PageSetupDlgW
SafeArrayUnaccessData
SafeArrayCopyData
VarR4FromUI2
VarCyFromStr
GetVarConversionLocaleSetting
VerLanguageNameW
GetFileVersionInfoSizeA
GetFileVersionInfoW
getpeername
shutdown
htonl
WSAEnumNetworkEvents
WSARecvDisconnect
getprotobynumber
getservbyname
recvfrom
UpdateUrlCacheContentPath
InternetCrackUrlA
InternetGetCookieA
ShowX509EncodedCertificate
GetUrlCacheHeaderData
FtpDeleteFileW
InternetCanonicalizeUrlA
GetUrlCacheConfigInfoA
FtpGetFileSize
IsUrlCacheEntryExpiredA
InternetAutodialHangup
RunOnceUrlCache
FtpRenameFileA
InternetGetCookieExA
InternetTimeToSystemTime
MimeOleSMimeCapGetEncAlg
MimeOleSMimeCapInit
MimeOleAlgStrengthFromSMimeCap
HrDoAttachmentVerb
MimeOleParseRfc822Address
MimeGetAddressFormatW
HrGetAttachIcon
DllGetClassObject
MimeOleGetCodePageCharset
MimeEditIsSafeToRun
MimeOleObjectFromMoniker
MimeOleCreateMessage
OleUICanConvertOrActivateAs
OleUIChangeSourceA
OleUIAddVerbMenuA
OleUIBusyW
OleUIPromptUserA
OleUIObjectPropertiesW
OleUIChangeIconA
_GetObject@12
_GetCompressedFileSize_@8
_CreateDialogParam_@20
_FreeEnvironmentStrings@4
_ttof
AllocConvertMultiSZNameToAEx
_GetVolumeInformation_@32
_NDdeGetShareSecurity_@24
_GetTextExtentPoint32@16
gethostbyname
htons
getnetbyname
GetAcceptExSockaddrs
WSAUnhookBlockingHook
inet_ntoa
SetServiceA
WSAAsyncGetServByName
ioctlsocket
select
s_perror
PaletteAssociateNotify
FlushD3DDevices
Direct3DCreateDevice
_CIcos
vfprintf
_osmode_dll
_osversion_dll
vswprintf
_spawnlp
_strdec
_mbstrlen
_mbctombb
BackupPerfRegistryToFileW
SetServiceAsTrustedA
UnloadPerfCounterTextStringsA
??0logic_error@@QAE@ABQBD@Z
?floatfield@ios@@2JB
?is_open@ofstream@@QBEHXZ
??4ios@@IAEAAV0@ABV0@@Z
?underflow@stdiobuf@@UAEHXZ
?lockptr@streambuf@@IAEPAU_CRT_CRITICAL_SECTION@@XZ
?text@filebuf@@2HB
??_Dostrstream@@QAEXXZ
?pptr@streambuf@@IBEPADXZ
?seekoff@streambuf@@UAEJJW4seek_dir@ios@@H@Z
?AllocBeforeWrite@CString@@IAEXH@Z
??_7CCriticalSection@@6B@
?FreeAssoc@CMapStringToPtr@@IAEXPAUCAssoc@1@@Z
?AssignCopy@CString@@IAEXHPBG@Z
?FreeExtra@CString@@QAEXXZ
??4CString@@QAEABV0@D@Z
??_FCMapStringToPtr@@QAEXXZ
?Format@CString@@QAAXPBGZZ
?GetCount@CMapStringToPtr@@QBEHXZ
?RemoveAll@CStringArray@@QAEXXZ
??1CMapStringToPtr@@UAE@XZ
??9@YG_NABVCString@@PBG@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ