Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
fa87e72e9ecd65c1ccc090e83c16a4b5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa87e72e9ecd65c1ccc090e83c16a4b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fa87e72e9ecd65c1ccc090e83c16a4b5_JaffaCakes118
Size
1.3MB
MD5
fa87e72e9ecd65c1ccc090e83c16a4b5
SHA1
1b071211e79a839ea4007a156c062ab1a866ad3d
SHA256
6070a58d569080da94fe81cea672a35854504c8b7a7c88b1d3f83fdf3fb8259d
SHA512
0453ee4eac1b1d898a4279dcf34a8fd8a8cfe1436a364dd241bebd89b55600110be81692d278af940396b0ea50f59a47c443601edd839f83a379ebb992fa8086
SSDEEP
24576:n44Aol8JQSmc4P4SgpxWXRMPIbu4VQPlpHgU:n46l9P4SrXRMPIi4qD
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GdipDeleteStringFormat
GdipFree
GdipLoadImageFromStream
GdipCloneImage
GdipDisposeImage
GdiplusShutdown
GdiplusStartup
GdipSetStringFormatTrimming
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDrawString
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipAlloc
GdipCreateStringFormat
GdipDeleteFont
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipGetGenericFontFamilySansSerif
GdipCreateFont
GdipDrawLines
GdipFillPolygon
GdipDrawImageRectI
GdipDrawLineI
GdipDeletePen
GdipCreatePen1
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipDeleteGraphics
GdipCreateFromHDC
GdipGetImageWidth
GdipGetImageHeight
IsValidLocale
GetFileType
HeapFree
HeapReAlloc
HeapAlloc
GetACP
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetFileSizeEx
SetLastError
WriteFile
RegisterWaitForSingleObject
InterlockedCompareExchange
WaitForMultipleObjects
GetTempPathW
CreateMutexW
WaitForSingleObject
LocalAlloc
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
UnmapViewOfFile
DuplicateHandle
OpenProcess
CreateEventW
MultiByteToWideChar
Sleep
FormatMessageW
GetLastError
SetEvent
DeleteFileW
CloseHandle
SetFilePointerEx
UnregisterWaitEx
LocalFree
GetCurrentProcessId
GetModuleHandleW
InterlockedIncrement
LocalFlags
CreateFileMappingW
MapViewOfFile
lstrcmpiW
FlushFileBuffers
MulDiv
GetVolumeInformationW
GetSystemDirectoryW
GetComputerNameW
GetUserDefaultLCID
InterlockedDecrement
ResetEvent
WideCharToMultiByte
FindResourceExW
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
VerSetConditionMask
VerifyVersionInfoW
GetModuleFileNameW
MoveFileW
GetExitCodeProcess
ReadFile
CreateDirectoryW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
UnhandledExceptionFilter
GetProcAddress
WaitForSingleObjectEx
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetStringTypeW
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LCMapStringW
GetLocaleInfoW
GetCPInfo
OutputDebugStringW
FreeLibrary
LoadLibraryExW
RtlUnwind
EnumSystemLocalesW
GetConsoleCP
GetConsoleMode
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
HeapSize
WriteConsoleW
InterlockedExchange
SetCapture
GetDlgCtrlID
PostMessageW
PtInRect
ScreenToClient
EndPaint
OffsetRect
FillRect
BeginPaint
UpdateWindow
MoveWindow
SetWindowTextW
InvalidateRect
ReleaseCapture
LoadCursorW
SetCursor
GetDlgItem
GetWindowTextW
PostQuitMessage
IsDlgButtonChecked
RegisterClassW
SetWindowPos
SetWindowLongW
AdjustWindowRect
SetRect
DrawTextW
CheckDlgButton
EnableWindow
GetWindowLongW
SendMessageW
GetDC
GetSystemMetrics
ReleaseDC
DefWindowProcW
CallWindowProcW
SendMessageTimeoutW
DestroyWindow
IsWindowVisible
CreateWindowExW
RemovePropW
IsWindow
DispatchMessageW
GetMessageW
TranslateMessage
RegisterWindowMessageW
ShowWindow
SetBkColor
GetObjectA
CreateFontW
CreateSolidBrush
SetTextColor
SetBkMode
SelectObject
GetDeviceCaps
ConvertSidToStringSidW
CryptAcquireContextW
CryptReleaseContext
LookupAccountNameW
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
SHGetMalloc
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemFree
CoInitializeEx
CoUninitialize
VarI4FromStr
VarUI8FromStr
WinHttpOpenRequest
WinHttpCrackUrl
WinHttpWriteData
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpOpen
WinHttpQueryHeaders
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpCloseHandle
WinHttpSendRequest
WinHttpSetStatusCallback
WinHttpQueryOption
WinHttpConnect
ObtainUserAgentString
PathAppendW
StrCmpNA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ