Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
d709b00aac5f22189d2f966278c51cbd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d709b00aac5f22189d2f966278c51cbd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d709b00aac5f22189d2f966278c51cbd_JaffaCakes118
Size
1.2MB
MD5
d709b00aac5f22189d2f966278c51cbd
SHA1
ea7c2a48fed0ad3de32faa9e78589bd32f58ef00
SHA256
14897247908fa72e5daa313b9a72c41def0b4a41121a8a591fef2cf06ee7bb28
SHA512
5eccecbedee645cc57a41b720e057b37cdecb14b7335f87cdae906ae25da63a45b884ee90d92532634be9966dcdd157d28b29e3e19b75ec9a1f70fb96a696ef6
SSDEEP
24576:6GrJh4Ps44kQYrIDymaTZrIDR1gmILjhsJwMMwZ2AKlLK:6GFhLDB1HIL14MuPKo
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetOpenW
InternetQueryOptionW
InternetOpenUrlW
InternetReadFile
InternetGetConnectedState
InternetCloseHandle
HttpQueryInfoW
ord17
GetModuleFileNameW
lstrcmpW
GlobalUnlock
FlushInstructionCache
RaiseException
SetLastError
EnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
FindResourceW
LoadResource
WaitForSingleObject
GetTickCount
WriteFile
Sleep
SizeofResource
GetExitCodeProcess
CreateFileW
GetCurrentDirectoryW
LockResource
SetCurrentDirectoryW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetProcAddress
lstrcmpiW
lstrcpynW
CreateDirectoryW
TerminateThread
WritePrivateProfileStringW
CreateThread
GetTempPathW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
DeleteFileW
FreeResource
LoadLibraryW
FlushFileBuffers
CreateFileA
GetLocaleInfoA
MulDiv
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapSize
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LoadLibraryA
InterlockedExchange
LocalAlloc
LeaveCriticalSection
GetVersionExW
WideCharToMultiByte
InitializeCriticalSection
GlobalLock
InterlockedDecrement
MoveFileExW
InterlockedIncrement
lstrlenA
CreateMutexW
LocalFree
CloseHandle
GlobalFree
VirtualQuery
GetLastError
lstrlenW
MultiByteToWideChar
GlobalAlloc
OpenProcess
HeapFree
GetCurrentProcess
HeapAlloc
GetVolumeInformationW
GetProcessHeap
GetComputerNameW
InterlockedCompareExchange
IsProcessorFeaturePresent
GetModuleHandleA
GetStringTypeW
IsWindow
SetWindowPos
CreateWindowExW
ReleaseCapture
SendMessageW
SetWindowTextW
CallWindowProcW
DefWindowProcW
GetWindow
MoveWindow
GetUserObjectSecurity
GetWindowThreadProcessId
GetShellWindow
UnregisterClassA
SetLayeredWindowAttributes
GetCursorPos
SystemParametersInfoW
LoadIconW
TranslateMessage
PostQuitMessage
GetMessageW
GetWindowRect
UpdateLayeredWindow
AnimateWindow
UpdateWindow
EnumWindows
PostMessageW
MessageBoxW
GetSysColor
GetDesktopWindow
DispatchMessageW
LockWindowUpdate
CheckRadioButton
ShowWindow
TrackMouseEvent
DrawFrameControl
SetCursor
GetWindowDC
EnableWindow
GetDlgCtrlID
EndPaint
ClientToScreen
DestroyWindow
GetWindowTextLengthW
DestroyAcceleratorTable
ScreenToClient
CharNextW
RegisterWindowMessageW
FillRect
IsChild
SetCapture
UnregisterClassW
SetForegroundWindow
GetFocus
GetParent
InvalidateRgn
LoadCursorW
FindWindowW
GetClientRect
CreateAcceleratorTableW
SetFocus
BeginPaint
GetClassInfoExW
GetDC
RegisterClassExW
InvalidateRect
GetWindowLongW
GetWindowTextW
GetClassNameW
ReleaseDC
GetDlgItem
SetWindowLongW
RedrawWindow
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
GetDeviceCaps
CreateSolidBrush
BitBlt
SetBkMode
SetBkColor
SetTextColor
CreateFontW
DeleteDC
GetObjectW
SelectObject
GetStockObject
GetTokenInformation
GetUserNameW
ConvertSidToStringSidA
OpenProcessToken
RegCloseKey
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
RegOpenKeyW
AdjustTokenPrivileges
RegOpenKeyExW
IsValidSid
GetSecurityDescriptorOwner
LookupAccountSidW
LookupPrivilegeValueW
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
ord680
OleInitialize
StringFromGUID2
OleUninitialize
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CoGetClassObject
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoInitialize
CoCreateInstance
CreateStreamOnHGlobal
SysAllocString
SysStringLen
VariantClear
LoadTypeLi
VariantInit
SysAllocStringLen
OleCreateFontIndirect
SysFreeString
LoadRegTypeLi
VarUI4FromStr
StrCpyNW
StrCatW
StrStrIW
wnsprintfW
StrCmpW
PathFileExistsW
StrTrimW
StrCpyW
StrStrW
StrRChrW
AssocQueryStringW
StrNCatW
UrlEscapeW
ord176
StrCmpIW
WinVerifyTrust
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ