Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
f9a599c6a5e16727d64d45a42d185aa1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f9a599c6a5e16727d64d45a42d185aa1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
f9a599c6a5e16727d64d45a42d185aa1_JaffaCakes118
Size
504KB
MD5
f9a599c6a5e16727d64d45a42d185aa1
SHA1
9b259920d1ffbb5e9219362440f98bd5bb9c32c2
SHA256
c60e671b42142511ca641488b310901331fc5eddd4d00ef9e3d54d7cd1476d52
SHA512
5440bb0a0ea9616f569a2962e72ada4ca214a53e454aaa549300ee5693c626c3ab9a42b7d210fdd3e53005ce5f5d159b7f9b4cfd9fb41b91e3c45493649298f9
SSDEEP
12288:PiHcu5Exolx8Yd1IMZ4phn68vDVqW/wBCzQ8L9b21H4R8u:KHLhihtEE8Cc8L9szu
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftKernelCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftKernelCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
lstrcmpA
MulDiv
lstrlenA
InterlockedIncrement
InterlockedDecrement
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
WinExec
lstrcmpW
GetVersionExA
OutputDebugStringW
LocalFree
LocalAlloc
TerminateProcess
WritePrivateProfileStringA
GetPrivateProfileIntA
GetPrivateProfileStringA
WaitForSingleObject
CreateProcessA
InitializeCriticalSection
DeleteFileA
TerminateThread
CreateThread
CreateMutexA
ExitProcess
ReleaseMutex
InterlockedPopEntrySList
VirtualFree
InterlockedPushEntrySList
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetTickCount
QueryPerformanceCounter
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetLocaleInfoW
IsValidCodePage
GetOEMCP
GetACP
HeapReAlloc
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WriteFile
SetHandleCount
HeapCreate
IsProcessorFeaturePresent
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCPInfo
LCMapStringW
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetDateFormatA
GetTimeFormatA
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
GetModuleFileNameW
GetStdHandle
GetFileType
WriteConsoleW
HeapAlloc
GetSystemTimeAsFileTime
HeapFree
RtlUnwind
InterlockedCompareExchange
DecodePointer
EncodePointer
InterlockedExchange
lstrlenW
LoadLibraryW
WideCharToMultiByte
RaiseException
Sleep
GetLastError
GetCurrentProcessId
GetModuleFileNameA
CreateToolhelp32Snapshot
Process32First
CloseHandle
Process32Next
SetLastError
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
FreeEnvironmentStringsW
LeaveCriticalSection
FindNextFileA
MultiByteToWideChar
GetModuleHandleA
GetProcAddress
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
FindClose
VirtualFreeEx
GetTempPathA
GetTempFileNameA
FindFirstFileA
GetEnvironmentStringsW
GetDC
ReleaseDC
RegisterClassA
DefWindowProcA
TrackPopupMenu
AppendMenuA
SetWindowLongA
GetCursorPos
DestroyWindow
SetWindowPos
GetWindowThreadProcessId
SendMessageA
ShowWindow
IsWindowVisible
SetTimer
KillTimer
FindWindowA
LoadCursorA
SetCursor
FindWindowExA
UpdateLayeredWindow
GetSystemMetrics
RegisterClassExA
PostQuitMessage
GetWindowLongA
CallWindowProcA
PostMessageA
GetWindowRect
MoveWindow
IsWindow
LoadImageA
GetSysColor
CharNextA
GetClientRect
ClientToScreen
ScreenToClient
InvalidateRect
InvalidateRgn
RedrawWindow
SetCapture
IsChild
GetParent
GetDlgItem
GetClassNameA
ReleaseCapture
FillRect
EndPaint
CreatePopupMenu
PtInRect
CreateWindowExA
SystemParametersInfoA
GetForegroundWindow
AttachThreadInput
GetShellWindow
WindowFromPoint
GetClassInfoExA
BeginPaint
DestroyAcceleratorTable
GetWindow
GetFocus
SetFocus
GetDesktopWindow
SetForegroundWindow
wsprintfW
GetMessageA
DispatchMessageA
TranslateMessage
SetActiveWindow
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
CreateAcceleratorTableA
UnregisterClassA
GetDeviceCaps
BitBlt
CreateCompatibleBitmap
CreateSolidBrush
DeleteObject
CreateDIBSection
SelectObject
CreateCompatibleDC
GetObjectA
DeleteDC
GetStockObject
OpenProcessToken
AdjustTokenPrivileges
RegEnumKeyExA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
RegQueryInfoKeyW
LookupPrivilegeValueA
SHGetSpecialFolderPathA
Shell_NotifyIconA
CommandLineToArgvW
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
StgCreateDocfile
OleCreate
CoTaskMemRealloc
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CoGetClassObject
CoTaskMemAlloc
OleLockRunning
StringFromGUID2
CoCreateInstance
CoInitialize
CoTaskMemFree
CoUninitialize
CLSIDFromProgID
SysStringLen
VariantInit
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
GdipFree
GdiplusStartup
GdipCloneImage
GdipDrawImageRectI
GdipFillRectangleI
GdipGraphicsClear
GdipDrawLineI
GdipCreateFromHDC
GdipCreateSolidFill
GdipCreateBitmapFromFile
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipDeletePen
GdipCreatePen1
GdipDeleteBrush
GdipAlloc
InternetCrackUrlA
InternetOpenA
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
HttpQueryInfoA
InternetReadFileExA
InternetCloseHandle
StrStrIA
PathFileExistsA
_TrackMouseEvent
InitCommonControlsEx
Netbios
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
MakeSureDirectoryPathExists
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ