Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
fd931156e76e90ebf6860c42306137b7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd931156e76e90ebf6860c42306137b7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fd931156e76e90ebf6860c42306137b7_JaffaCakes118
Size
619KB
MD5
fd931156e76e90ebf6860c42306137b7
SHA1
ffdefd1785ac87bcd4ca823e64ab68e3ce46497e
SHA256
1d3d2eb92224be742c3fd4ba2ab4ce986463f2dbdba8504dcce9aaecdb66cd7c
SHA512
31e51c1849f98080106a50afc364a3d8da3fa922ffc4af472ee0c61398833767d0e8e9afa3f8439d36cca2bf286c1fc42d47e1411a601b41ee607b50d33a50f4
SSDEEP
6144:ohWkd8hFQa1oENSJZivvmHRBZUV+YRUgGHp9oUKMb0INh1pYNmGTBojqwkfMFU:ohsdH2HfZUV+YU9HD4Mn1pYkGT2O0e
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\Code\urlsoft\trunk\product\win32\urlcore2.pdb
InternetSetOptionA
InternetSetOptionExW
InternetSetOptionExA
HttpQueryInfoA
HttpSendRequestW
HttpOpenRequestA
InternetSetOptionW
HttpOpenRequestW
InternetConnectW
InternetCrackUrlW
InternetCloseHandle
InternetReadFile
InternetOpenA
HttpAddRequestHeadersA
InternetConnectA
GetModuleInformation
GetModuleBaseNameW
EnumProcesses
EnumProcessModules
GetModuleFileNameExW
WideCharToMultiByte
CompareStringW
lstrlenW
GetPrivateProfileIntW
WritePrivateProfileStringW
lstrlenA
GetCurrentThreadId
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpiW
SetLastError
GetLocalTime
GetModuleFileNameW
GlobalAddAtomW
CreateProcessW
GetCurrentProcessId
MoveFileW
DeleteFileW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetPrivateProfileStringW
SuspendThread
GetCommandLineW
Sleep
InitializeCriticalSection
OpenProcess
InterlockedIncrement
InterlockedDecrement
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetTickCount
MulDiv
lstrcpyA
SetUnhandledExceptionFilter
GetFileSize
VirtualQuery
GetProcAddress
GetVersionExW
GetCurrentThread
lstrcatW
CreateDirectoryW
ExitThread
ExitProcess
LoadLibraryW
TerminateProcess
Thread32Next
Thread32First
CreateProcessA
lstrcmpiA
LoadLibraryA
lstrcpynW
ResetEvent
FileTimeToSystemTime
FileTimeToLocalFileTime
TerminateThread
FindClose
FindFirstFileW
WaitForMultipleObjects
lstrcpynA
VirtualProtect
GetModuleHandleA
GetStringTypeA
QueryPerformanceCounter
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetFilePointer
UnmapViewOfFile
GetFileType
SetHandleCount
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
HeapCreate
GetCPInfo
LCMapStringW
LCMapStringA
IsDebuggerPresent
UnhandledExceptionFilter
GetSystemTimeAsFileTime
RtlUnwind
HeapSize
HeapReAlloc
HeapDestroy
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
VirtualFreeEx
VirtualQueryEx
VirtualAllocEx
CreateDirectoryA
CreateFileA
CopyFileW
CopyFileA
CopyFileExW
CopyFileExA
CreateMutexW
GetStartupInfoW
ReadProcessMemory
WriteProcessMemory
OpenEventW
SetThreadPriority
CreateThread
LoadLibraryExA
IsBadReadPtr
GetSystemTime
SetErrorMode
CreateJobObjectW
SetInformationJobObject
AssignProcessToJobObject
CreateFileMappingW
MapViewOfFile
GetSystemInfo
GlobalMemoryStatusEx
SetEnvironmentVariableA
CompareStringA
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStringTypeW
RaiseException
QueryPerformanceFrequency
CreateFileW
ReadFile
GetCurrentProcess
FlushInstructionCache
MultiByteToWideChar
FlushFileBuffers
WriteFile
SetEvent
CreateEventW
CloseHandle
WaitForSingleObject
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
LeaveCriticalSection
GetLastError
EnterCriticalSection
GetStartupInfoA
DispatchMessageW
EnumDesktopWindows
LoadImageW
RegisterWindowMessageW
SetForegroundWindow
GetActiveWindow
SetWindowsHookExW
ClientToScreen
CallNextHookEx
WindowFromPoint
DialogBoxParamW
CreateDialogParamW
TranslateMessage
GetMessageW
CreateDesktopW
GetThreadDesktop
PostThreadMessageW
FindWindowExW
CreateWindowExA
MessageBoxExA
MessageBoxExW
MessageBoxIndirectA
MessageBoxIndirectW
DialogBoxParamA
UnregisterClassA
PeekMessageW
GetDlgItemInt
MoveWindow
DestroyAcceleratorTable
CreateAcceleratorTableW
wsprintfW
SetDlgItemInt
CloseDesktop
GetSysColor
GetFocus
GetCapture
ReleaseCapture
CharLowerW
GetLastInputInfo
GetSystemMetrics
SetWindowLongW
CreateWindowExW
GetWindowLongW
PostMessageW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SendMessageW
GetWindowRect
GetClientRect
ScreenToClient
ShowWindow
IsWindowVisible
RedrawWindow
SetTimer
KillTimer
EnableWindow
SetFocus
EndPaint
BeginPaint
GetCursorPos
SetCursor
DrawFocusRect
FillRect
PtInRect
CallWindowProcW
GetDlgCtrlID
SetCapture
IsWindowEnabled
InvalidateRect
UpdateWindow
UnhookWindowsHookEx
GetClassNameW
RegisterClassExW
SetRectEmpty
ExitWindowsEx
EndDialog
OffsetRect
ReleaseDC
GetDC
GetSubMenu
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CharNextW
TrackPopupMenu
PostQuitMessage
DrawTextW
LoadCursorW
GetClassInfoExW
MonitorFromPoint
GetMonitorInfoW
DestroyMenu
SetMenuItemInfoW
LoadMenuW
DestroyWindow
GetWindow
SystemParametersInfoW
MapWindowPoints
SetWindowPos
UnregisterHotKey
RegisterHotKey
IsWindow
IsDialogMessageW
MessageBoxW
GetDlgItem
GetParent
DefWindowProcW
SetDlgItemTextW
SetTextColor
GetStockObject
SaveDC
CreateFontIndirectW
SelectObject
DeleteObject
GetObjectW
RestoreDC
RoundRect
GetTextExtentPoint32W
ExtTextOutW
SetBkColor
CreateCompatibleDC
SetViewportOrgEx
CreateCompatibleBitmap
CreatePen
CreateSolidBrush
BitBlt
MoveToEx
LineTo
GetDeviceCaps
DeleteDC
SetBkMode
RegCloseKey
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
InitiateSystemShutdownW
AdjustTokenPrivileges
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
OpenProcessToken
LookupPrivilegeValueW
RegOpenKeyExW
SHCreateDirectoryExW
SHFileOperationW
ShellExecuteExW
ShellExecuteExA
ShellExecuteA
SHGetFolderPathW
Shell_NotifyIconW
ShellExecuteW
SHGetFolderPathA
SHGetSpecialFolderPathW
CreateStreamOnHGlobal
CoGetClassObject
OleLockRunning
CoCreateGuid
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CLSIDFromString
OleInitialize
CoUninitialize
CoRevokeClassObject
CoRegisterClassObject
CreateBindCtx
OleUninitialize
SysFreeString
SysAllocString
SysStringLen
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
SafeArrayGetVartype
VariantInit
VariantClear
VariantCopy
SysAllocStringLen
SafeArrayCopy
SafeArrayCreate
VariantChangeType
SysAllocStringByteLen
SysStringByteLen
PathFindFileNameW
StrStrIA
StrCmpNIW
PathFindExtensionW
StrChrIA
StrToIntA
StrCmpNIA
StrChrIW
PathRemoveFileSpecW
PathAppendW
StrStrIW
SHGetValueW
SHSetValueW
SHDeleteValueW
StrCatW
PathFileExistsW
StrCmpIW
StrCpyW
StrCpyNW
PathFileExistsA
InitCommonControlsEx
_TrackMouseEvent
ImageList_Create
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
PlaySoundA
PlaySoundW
waveOutWrite
SendDriverMessage
sndPlaySoundA
sndPlaySoundW
mciSendStringA
mciSendStringW
mciSendCommandA
mciSendCommandW
CreateURLMoniker
CoInternetCreateSecurityManager
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ