Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
f540391d9939d0493882cefdd612ce9c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f540391d9939d0493882cefdd612ce9c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
f540391d9939d0493882cefdd612ce9c_JaffaCakes118
Size
945KB
MD5
f540391d9939d0493882cefdd612ce9c
SHA1
8f038cca1e1242b47ce2b7fb8b13ebff49e8d9e7
SHA256
582a399a5e4e611ddaae03702d124f11ccdb1a425f4a8216f50c76f9b5bc32f3
SHA512
93cc540d0c89a4aab490d889d31a53a32be465d660561859c127b839ba4ad993f3f1e4249fee9f12c72ae57568fa1fef2566367f014f64be8c47aed2946814c0
SSDEEP
6144:3icpjCn4NoX7wO2oxPLHKOsz6mLwxSVPSr41KvbSVPSr41KvZBILUz:ycxCaA8jOsz6mLwIizvWizvgUz
metasploit
windows/download_exec
http://192.168.1.121:8443/EGke
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ShellExecuteExW
SHDeleteKeyW
SHDeleteValueW
_TrackMouseEvent
AlphaBlend
_CxxThrowException
_vsnwprintf
wcscmp
iswdigit
wcstoul
toupper
wcschr
memmove
wcslen
_wcsrev
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
??3@YAXPAX@Z
??1type_info@@UAE@XZ
_controlfp
_except_handler3
__CxxFrameHandler
?terminate@@YAXXZ
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
GetModuleHandleA
LoadLibraryA
GetProcAddress
GlobalAlloc
GlobalFree
GlobalCompact
GetStartupInfoA
MulDiv
OutputDebugStringW
GlobalLock
GlobalSize
GlobalUnlock
lstrcpynW
ResetEvent
CreateEventW
GetCommandLineW
LocalAlloc
lstrcmpW
GetProfileStringW
SetLastError
LocalFree
LocalReAlloc
GetVersionExW
lstrlenW
GetStringTypeExW
GetUserDefaultLCID
GetDateFormatW
FileTimeToSystemTime
GetCurrentDirectoryW
SystemTimeToFileTime
GetLocalTime
CreateThread
CloseHandle
GetExitCodeThread
WaitForSingleObject
SetEvent
GetCurrentThreadId
GlobalReAlloc
SetBkColor
GetDeviceCaps
SelectObject
SetStretchBltMode
CreateFontIndirectW
GetDIBits
SetDIBits
IntersectClipRect
SelectClipRgn
ExcludeClipRect
CreateSolidBrush
GetTextExtentPoint32W
BitBlt
SetTextColor
SetBkMode
DeleteDC
CreateCompatibleDC
GetStockObject
CreateRoundRectRgn
DeleteObject
StretchBlt
CreateDIBSection
RedrawWindow
SetDlgItemInt
CheckDlgButton
PostQuitMessage
DefWindowProcW
IsClipboardFormatAvailable
CallNextHookEx
GetClassNameW
PtInRect
EndMenu
InflateRect
HideCaret
GetWindowDC
FillRect
TrackPopupMenuEx
OpenClipboard
GetClipboardData
CharNextA
CloseClipboard
GetDesktopWindow
GetSysColor
SetWindowsHookExW
UnhookWindowsHookEx
MessageBeep
GetMenu
GetSubMenu
CharNextW
RegisterClassExW
GetSysColorBrush
LoadCursorW
LoadIconW
MoveWindow
MapWindowPoints
GetWindowRect
GetWindowLongW
SetWindowRgn
EnumChildWindows
SetWindowPos
GetSystemMetrics
GetClientRect
InvalidateRect
UpdateWindow
SendMessageW
SetDlgItemTextW
EnableMenuItem
CheckMenuItem
CheckMenuRadioItem
OffsetRect
EnableWindow
LoadMenuW
CreateDialogParamW
GetDlgItem
SetWindowLongW
DestroyMenu
DestroyWindow
SetMenu
ShowWindow
SystemParametersInfoW
RegisterClassW
GetClassInfoW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
IsChild
IsDialogMessageW
GetFocus
GetMessageW
LoadAcceleratorsW
CreateWindowExW
MessageBoxW
LoadStringW
SetProcessDefaultLayout
GetProcessDefaultLayout
CallWindowProcW
PostMessageW
EndPaint
DrawIconEx
BeginPaint
SetWindowTextW
EndDialog
GetCursorPos
DestroyIcon
LoadImageW
DrawTextW
GetWindowTextW
ReleaseDC
GetDC
SetLayeredWindowAttributes
SetFocus
GetWindowTextLengthW
GetDlgCtrlID
DialogBoxParamW
SetCursor
CheckRadioButton
CoCreateInstance
CoUninitialize
CoInitializeEx
SysAllocString
SysStringLen
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ