Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
f6978fddcbc4825302b5ce1c889d97b5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6978fddcbc4825302b5ce1c889d97b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
f6978fddcbc4825302b5ce1c889d97b5_JaffaCakes118
Size
240KB
MD5
f6978fddcbc4825302b5ce1c889d97b5
SHA1
c4bfae6cb1abbbcb966a5a8b3cb5131ebaacb55e
SHA256
c72979fa05711be2cdd583dfeee419bc78e515bf5070d2eb71085be5a3e86e68
SHA512
53b42c4531c10baa425ff3f65e7f0887b3ffd6749d88241a47bff3e60a5ffdbb0dd7f28d418f2e671b835fa4e0c6ed700d3eb972c189ee85a6b7da329a1e47fb
SSDEEP
6144:udkzyL3keSTR/G0aTBq/EnpsJHninW358L3KX:ugyL3k9pG5Ts/jhninW353X
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VerQueryValueA
GetWindowsDirectoryA
MoveFileExA
LocalAlloc
lstrlenA
FormatMessageA
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleHandleA
DeleteFileA
WritePrivateProfileStringA
CloseHandle
GetTickCount
WaitForMultipleObjects
FreeLibrary
GetProcAddress
LoadLibraryA
GetTempFileNameA
GetTempPathA
CreateEventA
OpenProcess
GetCurrentProcessId
GetModuleFileNameA
GetLastError
GetVersionExA
LocalFree
Sleep
UnmapViewOfFile
GetComputerNameA
MapViewOfFile
CreateFileMappingA
Process32Next
Process32First
CreateToolhelp32Snapshot
WriteFile
SetFilePointer
CreateFileA
GetLocalTime
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
InterlockedExchange
HeapFree
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
GetTimeFormatA
GetDateFormatA
HeapAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
FlushFileBuffers
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
VirtualQuery
GetTimeZoneInformation
VirtualProtect
GetSystemInfo
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
HeapSize
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
SetStdHandle
ReadFile
GetLocaleInfoW
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
InitializeAcl
RegOpenKeyExA
RegSetValueExA
SetSecurityInfo
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ