Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
f335c7189b9ced336a4f3e3fb90fed89_JaffaCakes118.exe
Resource
win7-20240903-en
Target
f335c7189b9ced336a4f3e3fb90fed89_JaffaCakes118
Size
1.0MB
MD5
f335c7189b9ced336a4f3e3fb90fed89
SHA1
5856fa80afc153f38423ce5036d3bf4972519641
SHA256
8b4b8a5cfdf150e134bf441bcabdb60d37508bfb973a038a610386341420317f
SHA512
57dddf7e8a8ee055cdbfb4f92413793285c23f6a351ddf412e0ca90a58670d518b460db42063a6907a5240692d305e55efb270c968a05419e464b99da159ad5b
SSDEEP
12288:oVbaHbD19/nXEx5xuzi6AoS5qt4cW+EEFsfZdGvvOWTbY:oZ+bh9cTottW+jKZI3OWTE
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetVersion
LoadLibraryA
VirtualAlloc
VirtualFree
VirtualProtect
GetModuleHandleA
lstrcmpA
VerLanguageNameA
GetPrivateProfileStringW
lstrcpy
FindNextVolumeA
GetThreadPriority
SetTapePosition
EnumCalendarInfoExA
GetStdHandle
GetNumaHighestNodeNumber
FindResourceW
CreateIoCompletionPort
WriteProfileStringA
PulseEvent
LoadLibraryW
GetWindowDC
DisplayExitWindowsWarnings
ImpersonateDdeClientWindow
UnregisterMessagePumpHook
ValidateRect
BuildReasonArray
DdeQueryNextServer
DefRawInputProc
GetMenuInfo
LoadRemoteFonts
GetWindowTextA
GetCursor
CreateWindowExW
DrawTextA
CallMsgFilterA
GetCursorFrameInfo
RegisterLogonProcess
ToUnicode
RegisterDeviceNotificationA
CreatePopupMenu
UnlockWindowStation
TranslateAccelerator
DefMDIChildProcW
CloseClipboard
SetMenuItemInfoW
InvalidateRgn
MessageBoxExW
CopyRect
GdipTransformPoints
GdipSetPathGradientSurroundColorsWithCount
GdipAddPathClosedCurveI
GdipSetPenMode
GdipAddPathCurve2
GdipCreatePath
GdipAddPathRectangleI
GdipBitmapGetPixel
GdipGetPenStartCap
GdipSetPathGradientCenterColor
GdipGetPathGradientSurroundColorsWithCount
GdipIsVisibleRect
GdipCreateCachedBitmap
GdipGetStringFormatDigitSubstitution
GdipCreateMetafileFromStream
GdipCreateMatrix3
GdipGetFontCollectionFamilyList
GdipResetPenTransform
GdipGetPropertySize
GdipGetMetafileHeaderFromEmf
GdipCloneFont
GdipDrawBezierI
GdipCreateLineBrushFromRectWithAngleI
GdipGetAdjustableArrowCapWidth
GdipAddPathPolygon
GdipGetFamilyName
GdipAddPathStringI
GdipResetClip
SymLoadModule64
SymGetLineNext
SymMatchString
ImageAddCertificate
SymSetSearchPath
SymGetSymNext64
SymInitialize
SymGetLineFromName64
SplitSymbols
ImageGetDigestStream
ImagehlpApiVersionEx
SymGetLineFromName
ImagehlpApiVersion
ImageRvaToSection
SymGetLineFromAddr
GetImageUnusedHeaderBytes
SymGetSymFromAddr64
MapFileAndCheckSumW
SymLoadModule
SymEnumerateModules
SymFindFileInPath
SymEnumerateSymbols64
ImageLoad
ImageRemoveCertificate
BindImage
RealShellExecuteExA
StrRChrA
StrChrW
SHDestroyPropSheetExtArray
SHGetFolderPathW
SHCreateDirectoryExA
PathMakeUniqueName
ExtractIconW
SHGetMalloc
PifMgr_OpenProperties
ILRemoveLastID
SHGetRealIDL
ILFindLastID
ExtractAssociatedIconA
DragAcceptFiles
SHStartNetConnectionDialogW
StrRStrIA
SHAppBarMessage
DragQueryFileA
SHGetPathFromIDList
IsLFNDrive
SHBrowseForFolder
SHLoadNonloadedIconOverlayIdentifiers
OleUIPasteSpecialA
OleUIChangeSourceW
OleUICanConvertOrActivateAs
OleUIPromptUserA
OleUIConvertA
OleUIChangeSourceA
OleUIObjectPropertiesW
OleUIChangeIconA
OleUIObjectPropertiesA
OleUIInsertObjectW
OleUIAddVerbMenuW
OleUIEditLinksA
OleUIEditLinksW
OleUIAddVerbMenuA
OleUIBusyW
OleUIBusyA
GetSaveFileNameA
GetOpenFileNameA
ChooseColorW
ChooseFontW
ReplaceTextW
ChooseFontA
GetFileTitleA
GetFileTitleW
PrintDlgW
PageSetupDlgA
Ssync_ANSI_UNICODE_Struct_For_WOW
dwLBSubclass
PrintDlgExA
FindTextW
PageSetupDlgW
ReplaceTextA
FindTextA
LoadAlterBitmap
VerInstallFileA
VerFindFileW
GetFileVersionInfoSizeW
VerQueryValueW
VerQueryValueA
GetFileVersionInfoSizeA
VerFindFileA
GetFileVersionInfoW
CreateDispTypeInfo
VarR8Round
VarI4FromUI2
VarI1FromR8
OleIconToCursor
VarCat
VarR8Pow
VarDateFromUI2
VarDecFromDate
VarUI4FromDate
VarCmp
VarI4FromUI1
SafeArrayUnaccessData
VarDateFromI1
VarI4FromI8
CoCreateObjectInContext
OleConvertOLESTREAMToIStorage
CoTreatAsClass
OleInitialize
OleDuplicateData
GetRunningObjectTable
CoSetState
CoGetMarshalSizeMax
StgConvertVariantToProperty
CoRegisterInitializeSpy
OleCreateFromDataEx
CoCreateFreeThreadedMarshaler
CLSIDFromProgIDEx
CoSwitchCallContext
WriteClassStm
CoFreeLibrary
HGLOBAL_UserFree
HPALETTE_UserSize
OleLoadFromStream
CreateClassMoniker
CoCreateInstanceEx
IsValidIid
HMETAFILEPICT_UserSize
HGLOBAL_UserSize
StgOpenPropStg
LresultFromObject
AccessibleObjectFromPoint
AccessibleObjectFromEvent
GetOleaccVersionInfo
AccessibleChildren
GetStateTextW
CreateStdAccessibleObject
AccessibleObjectFromWindow
GetRoleTextA
DllUnregisterServer
WindowFromAccessibleObject
DllCanUnloadNow
GetStateTextA
IID_IAccessible
DeleteMonitorW
ConfigurePortW
AddPrinterConnectionW
AddPortW
AddPrinterDriverW
SetFormA
AddPrintProcessorA
StartDocPrinterW
EnumPrinterDriversA
GetFormA
SetJobW
ResetPrinterW
SetFormW
DeletePortA
GetPrinterW
StartPagePrinter
AddJobW
EnumPrintersW
EnumPrinterDataExA
DEVICEMODE
ConvertAnsiDevModeToUnicodeDevmode
SpoolerPrinterEvent
DeletePrinterIC
QueryRemoteFonts
RegisterTraceGuidsW
SetThreadToken
LsaLookupSids
LsaSetQuotasForAccount
LsaSetTrustedDomainInfoByName
LsaRemovePrivilegesFromAccount
LookupPrivilegeDisplayNameA
ElfChangeNotify
CredReadW
SetPrivateObjectSecurity
LsaGetSystemAccessAccount
GetCurrentHwProfileA
GetTraceEnableLevel
RegQueryMultipleValuesW
SetSecurityDescriptorControl
LsaQuerySecurityObject
RegEnumKeyExA
LsaGetUserName
LookupPrivilegeNameA
SystemFunction005
ElfReportEventW
FreeSid
WmiQueryGuidInformation
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ