Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d612a6293c08e920dc948ae2c762a5e8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d612a6293c08e920dc948ae2c762a5e8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d612a6293c08e920dc948ae2c762a5e8_JaffaCakes118
Size
13.0MB
MD5
d612a6293c08e920dc948ae2c762a5e8
SHA1
08065632ac23357cf06960da4a102bf0062d7366
SHA256
757c1ea071caefaa8ba6c3f1dc7de31b3fd89be21c91e6e21324bef2d62d3170
SHA512
c81eee420152209c202fc815915c542233173e5a4b6d65bf6dd11be9b6a8cf1e25feb5575d6d12301447a4e45ba4f7ae359a81cab72d4d266bdc0418f2982e54
SSDEEP
49152:TWPqZkgGFZmxeOWtYCN43u7w9VFZnpu+2RJli2G3:KqZkg04c5NxUFNpuBRJli2G3
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\Documents and Settings\Timothy\My Documents\WorkCode\AntiSpwareBot\trunk\release\AntiSpywareBot.pdb
Tcl_CloneInterp
Tcl_GetStringResult
Tcl_CreateInterp
Tcl_ProcCmd
Tcl_CreateCommand
Tcl_DeleteInterp
Tcl_ResetResult
Tcl_DeleteClone
Tcl_EvalEx
Tcl_SplitList
Tcl_FreeList
Tcl_SetResult
WriteFile
FlushFileBuffers
lstrcmpA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GetCurrentThread
GlobalDeleteAtom
GetModuleFileNameW
InterlockedDecrement
SetThreadPriority
SuspendThread
GlobalAddAtomA
GetCurrentProcessId
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetThreadLocale
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
LocalAlloc
GetPrivateProfileIntA
GetPrivateProfileStringA
InterlockedIncrement
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
HeapCreate
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapReAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
GetCommandLineA
GetStartupInfoA
ExitThread
SetEnvironmentVariableA
SetStdHandle
GetFileType
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
ExitProcess
RaiseException
HeapSize
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapDestroy
ReadFile
ConnectNamedPipe
HeapCompact
CreateNamedPipeA
DisconnectNamedPipe
SetCurrentDirectoryA
GetFileSize
GetFullPathNameA
TerminateThread
WinExec
CreateFileA
GetSystemTime
SystemTimeToFileTime
lstrcpynA
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
FindClose
GetSystemDirectoryA
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
GetTempPathA
WritePrivateProfileStringA
HeapFree
GetProcessHeap
HeapAlloc
FreeLibrary
LoadLibraryA
GetVersionExA
GetSystemInfo
LocalFree
FormatMessageA
FileTimeToSystemTime
GetFileTime
ExpandEnvironmentStringsA
CreateThread
MoveFileA
SetLastError
DeleteFileA
TerminateProcess
GetFileAttributesA
GetCurrentProcess
EnterCriticalSection
CreateDirectoryA
GetLocalTime
Sleep
InitializeCriticalSection
lstrcpyA
SetConsoleScreenBufferSize
GetStdHandle
GetModuleFileNameA
GetConsoleScreenBufferInfo
AllocConsole
lstrcatA
GetLogicalDriveStringsA
SearchPathA
CreateProcessA
DeleteCriticalSection
FreeConsole
LeaveCriticalSection
CloseHandle
GetWindowsDirectoryA
CreateEventA
GlobalAlloc
ResumeThread
GlobalFree
MulDiv
GlobalUnlock
ResetEvent
GlobalLock
SetEvent
WaitForSingleObject
FreeResource
GetModuleHandleA
GetProcAddress
GetEnvironmentVariableA
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
UnhandledExceptionFilter
SetCapture
CharNextA
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
RegisterClipboardFormatA
PostThreadMessageA
MessageBeep
SetWindowContextHelpId
MapDialogRect
DestroyMenu
InflateRect
RegisterWindowMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
UpdateWindow
GetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CallWindowProcA
OffsetRect
IntersectRect
GetWindowPlacement
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
EnableMenuItem
CheckMenuItem
GrayStringA
DrawTextExA
TabbedTextOutA
UnhookWindowsHookEx
GetFocus
SetFocus
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetWindow
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
PeekMessageA
DispatchMessageA
TranslateMessage
GetSysColorBrush
SystemParametersInfoA
SetWindowPos
GetWindowDC
GetCaretPos
ScreenToClient
ModifyMenuA
LoadIconA
IsIconic
DrawIcon
PtInRect
MessageBoxA
IsWindow
EqualRect
FindWindowA
GetDesktopWindow
ExitWindowsEx
TrackMouseEvent
GetSystemMetrics
EndPaint
BeginPaint
SetPropA
GetDlgCtrlID
DefWindowProcA
GetPropA
UnregisterClassA
RegisterClassExA
DrawTextA
GetWindowTextA
GetWindowTextLengthA
SendMessageCallbackA
CreateWindowExA
DrawFocusRect
DrawEdge
WindowFromPoint
GetCapture
ReleaseCapture
ClientToScreen
DestroyCursor
FillRect
LoadCursorA
SetClassLongA
SetCursor
GetSysColor
KillTimer
GetDC
InvalidateRect
GetClientRect
SetWindowRgn
LoadImageA
GetParent
ReleaseDC
HideCaret
SetWindowLongA
GetSubMenu
GetWindowLongA
SetForegroundWindow
LoadMenuA
GetCursorPos
SetRect
PostMessageA
CopyRect
GetWindowRect
SendMessageA
EnableWindow
CharUpperA
SetTimer
RedrawWindow
LoadBitmapA
CopyIcon
ScaleWindowExtEx
ExtSelectClipRgn
CreatePatternBrush
GetTextExtentPoint32A
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
BitBlt
CreateCompatibleBitmap
StretchBlt
CreateRectRgnIndirect
GetObjectA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetClipBox
SetMapMode
RestoreDC
SaveDC
GetDIBits
CreateFontIndirectA
SetTextColor
SetBkColor
SetBkMode
ExtTextOutA
GetTextMetricsA
SelectClipRgn
DeleteDC
SelectObject
GetDeviceCaps
Rectangle
CombineRgn
CreateCompatibleDC
CreateBitmap
ExtCreateRegion
CreateRectRgn
CreateSolidBrush
GetPixel
DeleteObject
GetStockObject
SetWindowExtEx
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ord17
_TrackMouseEvent
PathStripToRootA
PathIsDirectoryA
SHDeleteKeyA
PathFindExtensionA
PathFindFileNameA
PathIsUNCA
UrlUnescapeA
PathFileExistsA
ord8
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoGetClassObject
StgOpenStorageOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
StgCreateDocfileOnILockBytes
CoTaskMemFree
CoUninitialize
CoInitializeEx
CreateStreamOnHGlobal
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysFreeString
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
OleLoadPicture
SysAllocString
OleCreateFontIndirect
SafeArrayDestroy
VariantCopy
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
InternetQueryDataAvailable
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
inflate
inflateInit2_
inflateEnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ