Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
f57ebea282a6fc59165216e49b6e417c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f57ebea282a6fc59165216e49b6e417c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
f57ebea282a6fc59165216e49b6e417c_JaffaCakes118
Size
2.7MB
MD5
f57ebea282a6fc59165216e49b6e417c
SHA1
4e3519b69fb90bac8189c8d99a63383f50693ffc
SHA256
e2e021eddc2525b846469914796d95eb6b63b869456e5585a0f2a1939827f0cc
SHA512
f554c5793acf52ef550f957a2a77d88b42f75b2da3eb87d9cb8798d7f9fef9238834468bb5ee7e03f9f099c6feffcff7e2a793b42c45f3f99153127221266bd2
SSDEEP
49152:DO0LlXr5Y6NbFSAM88j5j/gXYWZz1gXU8a8kDKfzLL:1LMQFSI0+eEIlL
metasploit
encoder/shikata_ga_nai
metasploit
windows/reverse_tcp
10.0.2.27:8080
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
f:\Agent\_work\3\s\exe\Win32\Release\procexp.pdb
ColorHLSToRGB
ColorRGBToHLS
ord176
SHAutoComplete
UrlUnescapeW
GetExtendedTcpTable
GetExtendedUdpTable
ntohs
WSAStartup
htonl
htons
ntohl
getservbyport
gethostbyaddr
WNetGetConnectionW
ImageList_ReplaceIcon
ImageList_Add
InitCommonControlsEx
ImageList_Destroy
ImageList_DrawEx
ord17
PropertySheetW
ImageList_Create
CreateStatusWindowW
ord410
ImageList_GetIcon
ord413
CreatePropertySheetPageW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
CredUIPromptForCredentialsW
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailW
SetupDiGetClassDevsW
SetupDiEnumDeviceInterfaces
CertDuplicateCertificateContext
CryptDecodeObject
CertGetNameStringW
ord1
IsPwrSuspendAllowed
SetSuspendState
IsPwrHibernateAllowed
WTSQuerySessionInformationW
WTSSendMessageW
WTSDisconnectSession
WTSLogoffSession
WTSFreeMemory
WTSEnumerateSessionsW
EnableThemeDialogTexture
NtOpenSymbolicLinkObject
NtQuerySystemInformation
NtSetInformationProcess
NtQuerySymbolicLinkObject
NtCreateKey
NtOpenKey
NtOpenThread
RtlCreateQueryDebugBuffer
NtQuerySemaphore
NtQueryEvent
NtResumeProcess
NtQueryInformationProcess
NtQueryInformationThread
NtSuspendProcess
NtSuspendThread
RtlQueryProcessDebugInformation
RtlDestroyQueryDebugBuffer
NtQueryObject
NtLoadDriver
RtlUnwind
NtResumeThread
NtQueryMutant
NtQuerySection
SelectObject
SetBkColor
SetBkMode
SetTextColor
GetTextMetricsW
SelectClipRgn
SetMapMode
StartDocW
EndDoc
StartPage
EndPage
CreateFontIndirectW
GetTextExtentPoint32W
SetTextAlign
ExtTextOutW
LineTo
Rectangle
RestoreDC
SaveDC
SetROP2
MoveToEx
CreateBitmap
RectInRegion
GetStockObject
GetDeviceCaps
GetBkMode
GetBkColor
DeleteDC
CreateSolidBrush
CreateRectRgnIndirect
CreateRectRgn
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteObject
GetObjectW
CreateDIBSection
Polyline
ChooseColorW
GetOpenFileNameW
GetSaveFileNameW
CommDlgExtendedError
PrintDlgW
ChooseFontW
FindTextW
GetFileSize
GetStdHandle
WriteFile
GetFileTime
CloseHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageA
MapViewOfFile
UnmapViewOfFile
lstrlenW
TlsAlloc
TlsSetValue
CreateFileMappingW
GetModuleFileNameW
GetModuleHandleW
CreateProcessW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
GetSystemWindowsDirectoryW
GetSystemWow64DirectoryW
GetFullPathNameW
GetCurrentThreadId
IsWow64Process
GetLocaleInfoW
GetTimeFormatW
GetDateFormatW
GetNumberFormatW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetFileAttributesW
FindFirstFileW
GetPrivateProfileStringW
FreeLibrary
LoadLibraryExW
ReadFile
MultiByteToWideChar
FindClose
FindNextFileW
LeaveCriticalSection
GetCurrentThread
EnterCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
CreateEventW
CreateThread
GetExitCodeThread
SetLastError
GetVersionExW
GetFileSizeEx
MulDiv
GetTickCount
LoadLibraryW
GlobalAddAtomW
FormatMessageW
LocalAlloc
InitializeCriticalSection
GetCommandLineW
LockResource
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
LoadResource
SizeofResource
FindResourceW
FindResourceExW
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalUnlock
TerminateThread
Module32FirstW
Module32NextW
DeleteCriticalSection
GetSystemTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
IsBadStringPtrW
OpenEventW
ReadProcessMemory
lstrcmpiW
GetEnvironmentVariableW
VirtualQueryEx
GetCurrentProcessId
SetFilePointer
IsProcessorFeaturePresent
GetSystemDirectoryW
DeleteFileW
SearchPathW
OpenThread
GetThreadContext
SuspendThread
ResumeThread
Thread32First
Thread32Next
ResetEvent
QueryPerformanceCounter
QueryPerformanceFrequency
IsBadReadPtr
GlobalFree
GlobalMemoryStatusEx
SetProcessWorkingSetSize
TerminateProcess
GetProcessId
PulseEvent
SetPriorityClass
GetComputerNameW
ProcessIdToSessionId
WTSGetActiveConsoleSessionId
GetLogicalProcessorInformation
GlobalMemoryStatus
VirtualAlloc
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetProcessWorkingSetSize
DeviceIoControl
DuplicateHandle
OutputDebugStringW
GetDriveTypeW
GetCurrentDirectoryW
CreateJobObjectW
QueryInformationJobObject
IsProcessInJob
WideCharToMultiByte
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
GetNativeSystemInfo
ExpandEnvironmentStringsA
LoadLibraryA
InitializeSListHead
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetTimeZoneInformation
FindFirstFileExW
SetErrorMode
GetLastError
ExitThread
GetCurrentProcess
OpenProcess
GetLongPathNameW
LocalFree
GetVersion
IsValidCodePage
GetOEMCP
GetProcAddress
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
TlsGetValue
GetStartupInfoW
GetStringTypeW
EncodePointer
SwitchToThread
TlsFree
CompareStringW
LCMapStringW
GetCPInfo
IsDebuggerPresent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetEnvironmentVariableA
SetStdHandle
SetFilePointerEx
WriteConsoleW
SetEndOfFile
ReadConsoleW
Sleep
GetFileType
SetUnhandledExceptionFilter
CreateFileW
SetMenuItemInfoW
GetWindowDC
EndTask
RegisterWindowMessageW
DrawEdge
GetMessageW
TranslateMessage
DispatchMessageW
ExitWindowsEx
PostQuitMessage
IsWindow
SetLayeredWindowAttributes
CreateDialogParamW
GetDlgItemTextW
IsWindowEnabled
LoadAcceleratorsW
TranslateAcceleratorW
LoadMenuW
DrawMenuBar
CreateMenu
RemoveMenu
TrackPopupMenu
GetMenuInfo
SetMenuInfo
EndMenu
RedrawWindow
WindowFromPoint
CheckMenuRadioItem
DrawIconEx
IsDialogMessageW
LockWorkStation
IsHungAppWindow
PeekMessageW
SendMessageTimeoutW
CheckRadioButton
GetDlgCtrlID
MsgWaitForMultipleObjects
KillTimer
GetDesktopWindow
GetWindow
GetGuiResources
LoadBitmapW
CopyImage
IsIconic
ShowWindowAsync
GetMonitorInfoW
MonitorFromPoint
EnumWindows
SetClassLongW
ClientToScreen
GetWindowTextW
InvalidateRgn
TrackPopupMenuEx
ModifyMenuW
AppendMenuW
GetMenuItemCount
GetMenuItemID
EnableMenuItem
CreatePopupMenu
EnableWindow
IsDlgButtonChecked
CheckDlgButton
GetWindowPlacement
LoadIconW
SetWindowPlacement
DefMDIChildProcW
DefFrameProcW
DefDlgProcW
CreateIconIndirect
FrameRect
IsWindowVisible
DestroyWindow
GetClassNameW
EnumChildWindows
PtInRect
UnionRect
CopyRect
ScreenToClient
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
IsZoomed
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
DrawFrameControl
ChildWindowFromPoint
SetDlgItemTextW
DialogBoxParamW
MoveWindow
SetWindowTextW
GetDlgItem
EndDialog
DialogBoxIndirectParamW
GetScrollInfo
SetScrollInfo
GetParent
GetClassLongW
SetWindowLongW
GetWindowLongW
OffsetRect
IntersectRect
InflateRect
FillRect
GetSysColorBrush
GetSysColor
MapWindowPoints
GetCursorPos
GetWindowRect
GetClientRect
GetPropW
SetPropW
ScrollWindowEx
ValidateRect
InvalidateRect
GetUpdateRgn
GetUpdateRect
EndPaint
BeginPaint
UpdateWindow
DrawTextW
SetTimer
ReleaseCapture
SetCapture
GetCapture
GetKeyState
GetFocus
SetWindowPos
CreateWindowExW
RegisterClassExW
CallWindowProcW
PostMessageW
LoadStringW
ReleaseDC
GetDC
SendMessageW
WaitForInputIdle
ShowWindow
SetFocus
GetSystemMetrics
GetMenu
CheckMenuItem
GetSubMenu
InsertMenuW
EnumDisplaySettingsW
LoadImageW
DestroyIcon
LoadCursorW
GetWindowThreadProcessId
FindWindowExW
FindWindowW
SetCursor
MessageBoxW
SetForegroundWindow
DeleteMenu
DefWindowProcW
OpenProcessToken
GetTokenInformation
AdjustTokenPrivileges
EqualSid
QueryServiceConfigW
SetTokenInformation
IsValidSid
AllocateAndInitializeSid
GetSidIdentifierAuthority
GetSidSubAuthority
GetSidSubAuthorityCount
InitializeAcl
AddAce
GetAce
AddAccessAllowedAce
FreeSid
LookupAccountSidW
CreateRestrictedToken
GetSecurityInfo
SetSecurityInfo
LsaFreeMemory
LsaClose
LsaOpenPolicy
LsaEnumerateAccountRights
RevertToSelf
FlushTraceW
RegConnectRegistryW
CreateProcessAsUserW
GetKernelObjectSecurity
SetKernelObjectSecurity
LookupPrivilegeNameW
EnumServicesStatusExW
RegQueryValueExA
RegOpenKeyExA
GetLengthSid
CloseTrace
ProcessTrace
LookupAccountNameW
LookupPrivilegeValueW
ImpersonateLoggedOnUser
DuplicateTokenEx
RegCreateKeyExW
OpenTraceW
ControlTraceW
StartTraceW
SetServiceObjectSecurity
QueryServiceObjectSecurity
MapGenericMask
RegCreateKeyW
StartServiceW
ConvertSidToStringSidW
RegCloseKey
QueryServiceStatus
ControlService
RegDeleteKeyW
RegEnumKeyW
RegEnumValueW
QueryServiceConfig2W
OpenServiceW
OpenSCManagerW
GetServiceDisplayNameW
CloseServiceHandle
RegDeleteValueW
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
RegQueryValueW
RegUnLoadKeyW
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyW
CopySid
RegLoadKeyW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHBrowseForFolderW
Shell_NotifyIconW
SHGetMalloc
ShellExecuteExW
SHGetFolderPathW
SHGetFileInfoW
CoInitializeEx
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoSetProxyBlanket
VariantCopy
SysAllocStringLen
SafeArrayGetElement
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetLBound
SysAllocString
SysFreeString
SysStringLen
SysAllocStringByteLen
VariantInit
VariantClear
VariantChangeType
SafeArrayDestroy
SafeArrayGetUBound
WinHttpConnect
WinHttpReadData
WinHttpWriteData
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpOpen
WinHttpCloseHandle
GetMappedFileNameW
QueryWorkingSet
GetModuleFileNameExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ