Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
fd263ddc08de8aada17f0c787df57a8e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fd263ddc08de8aada17f0c787df57a8e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fd263ddc08de8aada17f0c787df57a8e_JaffaCakes118
Size
321KB
MD5
fd263ddc08de8aada17f0c787df57a8e
SHA1
45a7b70aa070a79ddfadd98f2ac79e54f809b9a2
SHA256
3046d2b2514962d9874479465d1b3fc6782bc2d33c2a9e4f0fceac735d1e5d91
SHA512
07ba736d3be4445c5f1d480acced6c770a23d0f8166adc662ce5c3510bf1c1cc4ad0727c22bb23daf8f3747ad55b96e08a833979eaba4640c413ce441a32f883
SSDEEP
6144:xgw0sedlRpHpPwAgrPI3SDV9Z1jNFhs6USTJ:xgfDT4PI3SD11AS
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\WorkCode\PIE\trunk\release\PIEService.pdb
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
lstrcmpW
GlobalFindAtomA
GetCPInfo
GetOEMCP
VirtualProtect
VirtualAlloc
VirtualQuery
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
SetCurrentDirectoryA
SetEnvironmentVariableA
SetStdHandle
GetFileType
GetTimeFormatA
GetDateFormatA
ExitProcess
RtlUnwind
RaiseException
GlobalAddAtomA
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetACP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetLocaleInfoW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GlobalFlags
GetCurrentDirectoryA
WaitForSingleObject
GlobalGetAtomNameA
LocalReAlloc
GlobalHandle
GlobalReAlloc
GetCurrentProcessId
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
LocalAlloc
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
SetFilePointer
GetThreadLocale
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
WritePrivateProfileStringA
GetProcessHeap
FileTimeToSystemTime
GetFileTime
CreateThread
TerminateProcess
GetFileAttributesA
GetCurrentProcess
GetVersionExA
GetSystemInfo
FormatMessageA
CreateDirectoryA
GetLocalTime
GetModuleFileNameA
lstrcpyA
GetStdHandle
DeleteCriticalSection
Sleep
InitializeCriticalSection
LoadLibraryA
GetProcAddress
WriteFile
HeapCreate
MoveFileA
LeaveCriticalSection
DeleteFileA
HeapCompact
EnterCriticalSection
HeapAlloc
ReadFile
HeapDestroy
CreateFileA
HeapFree
FreeLibrary
SetLastError
FindClose
FindFirstFileA
ResumeThread
SuspendThread
TlsGetValue
CompareStringW
TlsSetValue
CompareStringA
TlsAlloc
TlsFree
CloseHandle
LocalFree
DisconnectNamedPipe
FlushFileBuffers
SizeofResource
LoadResource
FindResourceA
MultiByteToWideChar
LockResource
WideCharToMultiByte
ConnectNamedPipe
CreateNamedPipeA
GetEnvironmentVariableA
GetVersion
InterlockedExchange
lstrlenA
GetModuleHandleA
GetCommandLineA
GetLastError
HeapSize
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
WinHelpA
LoadIconA
RegisterWindowMessageA
DefWindowProcA
CallWindowProcA
SetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
UnregisterClassA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
ShowWindow
DestroyMenu
GetWindowTextA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
PostMessageA
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
CharUpperA
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowTextA
SetWindowPos
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
DeleteObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
PtVisible
GetFileTitleA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
EqualSid
LookupAccountSidA
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetServiceStatus
GetSecurityDescriptorControl
GetSecurityDescriptorLength
MakeSelfRelativeSD
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
IsValidSid
GetSecurityDescriptorOwner
GetLengthSid
GetAce
LookupAccountNameA
GetAclInformation
InitializeSecurityDescriptor
GetSecurityInfo
CopySid
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerExA
SHGetFolderPathA
PathFileExistsA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathIsDirectoryA
CoUninitialize
CoInitializeEx
VariantInit
VariantClear
VariantChangeType
UnloadUserProfile
inflate
inflateInit2_
inflateEnd
Tcl_CreateInterp
Tcl_ProcCmd
Tcl_EvalEx
Tcl_DeleteInterp
Tcl_CloneInterp
Tcl_CreateCommand
Tcl_DeleteClone
Tcl_SetResult
Tcl_GetStringResult
Tcl_ResetResult
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ