Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
e0be28d43af0953731798384afcbbb77_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0be28d43af0953731798384afcbbb77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
e0be28d43af0953731798384afcbbb77_JaffaCakes118
Size
1.3MB
MD5
e0be28d43af0953731798384afcbbb77
SHA1
bcc546c70da8b36f59dc2b0a7cffd53570a93d1c
SHA256
2d7b3d4b4dc7c882b4231238fd673d139420fee76e74d39800214773aaf6bf15
SHA512
2a92dbec6552d3041dfc086f3d7bf80eb4af8a577cef1e212545c561c407fd2eafa1baf7985b4ad9321e00bdcb9b0cefb197c898242e0c924e4f03adafee6df9
SSDEEP
24576:pIrhHQ/KnlhFFQSJoDhl7trFbOSehoLzxWOdIHj1S:O+X1F6TGxWO21S
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
f:\Devtrees\helpton\trunk\binaries\release\client\bbt_thinclient.pdb
HeapAlloc
GetProcessHeap
OutputDebugStringA
lstrcpynW
CreateProcessW
GetTempPathW
CreateDirectoryW
DeleteFileW
CopyFileW
SetFileAttributesW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetFullPathNameA
GetDriveTypeA
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
SetConsoleCtrlHandler
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleHandleA
GetTimeZoneInformation
FlushFileBuffers
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetOEMCP
GetACP
TlsFree
HeapFree
GetLastError
WaitForMultipleObjects
GetModuleFileNameA
ExitProcess
FatalAppExitA
HeapCreate
SetFilePointer
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetCurrentDirectoryA
GetCurrentDirectoryA
GetFullPathNameW
LCMapStringW
LCMapStringA
GetCPInfo
GetStartupInfoW
GetFileAttributesW
ExitThread
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
FindFirstFileW
GetDriveTypeW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
InterlockedExchange
HeapSize
HeapReAlloc
HeapDestroy
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
DisableThreadLibraryCalls
ResumeThread
SuspendThread
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
VirtualQuery
SetThreadContext
GetThreadContext
CreateFileA
GetSystemInfo
TlsSetValue
DeviceIoControl
ReadFile
CreateFileW
WaitNamedPipeW
ConnectNamedPipe
WriteFile
CloseHandle
GetCurrentThreadId
WideCharToMultiByte
GetOverlappedResult
TerminateThread
DisconnectNamedPipe
CreateNamedPipeW
CreateThread
FindResourceExW
CreateMutexW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetThreadPriority
GetCurrentThread
GetTickCount
lstrcmpiW
LoadLibraryExW
GetModuleHandleW
InterlockedDecrement
InterlockedIncrement
MulDiv
lstrcmpW
SetLastError
GetCurrentProcess
FlushInstructionCache
LocalFree
EnumResourceNamesW
FindResourceW
SizeofResource
LoadResource
LockResource
GetPrivateProfileStringW
InitializeCriticalSection
RaiseException
DeleteCriticalSection
Sleep
LoadLibraryW
GetProcAddress
FreeLibrary
TlsGetValue
CreateSemaphoreW
SetEvent
CreateEventW
ResetEvent
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
GetLocalTime
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameW
GetModuleFileNameW
GlobalAlloc
GetVersionExW
GlobalLock
GlobalUnlock
TlsAlloc
PostMessageW
GetDC
ReleaseDC
IsWindowVisible
PeekMessageW
IsIconic
SendMessageW
GetLastActivePopup
SetForegroundWindow
SetWindowPos
GetMessageW
TranslateMessage
DispatchMessageW
MessageBoxW
IsWindow
ShowWindow
FindWindowW
DestroyMenu
GetSubMenu
DestroyWindow
EndPaint
GetClientRect
BeginPaint
MoveWindow
UpdateWindow
RedrawWindow
SendMessageTimeoutW
DefWindowProcW
MapWindowPoints
GetMonitorInfoW
MonitorFromWindow
GetWindowLongW
GetWindowRect
MessageBeep
GetParent
RegisterClassExW
LoadCursorW
GetClassInfoExW
RegisterWindowMessageW
SetWindowLongW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
GetWindowTextA
GetSysColor
SetFocus
IsDialogMessageW
SetTimer
CreateWindowExW
CallWindowProcW
CopyRect
OffsetRect
ScreenToClient
GetWindowDC
IsZoomed
PostThreadMessageW
DestroyAcceleratorTable
GetFocus
IsChild
FillRect
GetClassNameW
CharNextW
GetDesktopWindow
CreateAcceleratorTableW
LoadMenuW
GetCursorPos
TrackPopupMenu
ClientToScreen
ReleaseCapture
SetCapture
InvalidateRect
InvalidateRgn
GetDlgItem
GetCapture
PtInRect
IntersectRect
EqualRect
DrawTextW
SetCursor
EnableWindow
IsWindowEnabled
BringWindowToTop
SetActiveWindow
GetActiveWindow
PostQuitMessage
SetWindowRgn
LoadIconW
KillTimer
IsCharAlphaNumericW
GetWindow
GetSystemMetrics
SetRect
DestroyIcon
DrawIconEx
UnregisterClassA
SetWindowOrgEx
GetViewportExtEx
SetMapMode
GetMapMode
GetBkColor
SetDIBitsToDevice
CreateRoundRectRgn
CreateDIBSection
GetObjectA
GetTextMetricsW
IntersectClipRect
GetClipRgn
GetClipBox
GetTextExtentPoint32W
SetBkColor
ExtTextOutW
GetWindowExtEx
GetDeviceCaps
CreateSolidBrush
DeleteDC
ExcludeClipRect
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateRectRgnIndirect
SelectClipRgn
SelectObject
GetObjectW
CreateFontIndirectW
GetStockObject
DeleteObject
SetBkMode
EnumFontsW
DPtoLP
LPtoDP
SetViewportExtEx
SetTextColor
SetWindowExtEx
SetSecurityDescriptorDacl
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorGroup
RegQueryValueExA
RegOpenKeyW
RegSetValueW
RegQueryInfoKeyW
RegDeleteValueW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
OpenProcessToken
RegCreateKeyW
LookupPrivilegeValueW
Shell_NotifyIconW
SHGetSpecialFolderPathW
ShellExecuteW
CreateStreamOnHGlobal
CoUninitialize
CoCreateGuid
CoGetMalloc
CoTaskMemRealloc
CoTaskMemFree
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoCreateInstance
OleInitialize
OleUninitialize
CoInitialize
LoadRegTypeLi
VariantInit
VariantClear
SafeArrayCopy
DispCallFunc
VarUI4FromStr
LoadTypeLi
SysFreeString
OleCreateFontIndirect
VarBstrCmp
SysAllocString
SysStringLen
SysAllocStringLen
UrlUnescapeW
SHGetValueW
_TrackMouseEvent
UrlMkSetSessionOption
UrlMkGetSessionOption
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipDrawImageRectI
GdipDrawLineI
GdipSetPenDashOffset
GdipSetPenDashStyle
GdipCreatePen1
GdipGraphicsClear
GdipDeleteFont
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDrawString
GdipSetTextRenderingHint
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipDeleteStringFormat
GdipCreateStringFormat
GdipCreateSolidFill
GdipGetImageHeight
GdipGetImageWidth
GdipDrawImageRectRectI
GdipDrawImageRectRect
GdipFillRectangleI
GdipDeleteGraphics
GdipCreateFromHDC
GdipCloneBrush
GdipDeleteBrush
GdipCreateLineBrushFromRect
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipFree
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipAlloc
GdipDeletePen
OnExiting
Initialize
InternetConnectW
InternetReadFile
HttpQueryInfoW
HttpOpenRequestW
InternetCrackUrlW
InternetSetFilePointer
InternetCanonicalizeUrlW
HttpSendRequestW
InternetOpenW
InternetOpenUrlW
InternetSetOptionW
InternetCloseHandle
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ImmAssociateContext
GetAdaptersInfo
RpcStringFreeW
UuidToStringW
WSAStartup
ntohl
WSACleanup
inet_ntoa
getpeername
gethostname
htonl
getsockname
shutdown
setsockopt
bind
socket
closesocket
listen
accept
htons
inet_addr
connect
send
recv
gethostbyname
ntohs
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ