Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
02c67a4040ac89078841cd078c66ce8e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02c67a4040ac89078841cd078c66ce8e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
02c67a4040ac89078841cd078c66ce8e_JaffaCakes118
Size
326KB
MD5
02c67a4040ac89078841cd078c66ce8e
SHA1
7f800787194093c6d7e7e75a9efe2ec8d87e1190
SHA256
cf0fcd2d98e4f06a8cb93e878a74f4890fed43d8d5cf82c05510cd3743fe7128
SHA512
6ab942b81397b82ec76b7ea32f49ca8fdb17ef62cdbe3f39f739a5293503296fb2b9c3895559d88eaca79bb29fd6431fa4a49b9611a127267b41c050f0fa1c71
SSDEEP
6144:9ZWLqDtt8+3r6EjJdmCeog6zbrL+fuwMeo3FLYk8:9vBwC66zbrLUueo3FEk8
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindClose
FindFirstFileA
GetTempFileNameA
ReadFile
TerminateProcess
WaitForSingleObject
CreateProcessA
GetPrivateProfileStringA
FlushFileBuffers
WriteConsoleW
SetEndOfFile
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
GetFileType
LCMapStringW
LoadLibraryW
GetVersionExA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleFileNameW
GetStdHandle
HeapCreate
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
GetFileAttributesA
EncodePointer
DecodePointer
ExitProcess
RtlUnwind
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
LocalFree
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
LoadLibraryA
CreateMutexA
CreateDirectoryA
SetCurrentDirectoryA
Sleep
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
SetLastError
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleFileNameA
MulDiv
lstrcmpA
GetCurrentProcess
FlushInstructionCache
IsDBCSLeadByte
lstrcmpiA
lstrlenA
GetTempPathA
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetProcAddress
WideCharToMultiByte
DeleteFileA
CreateFileA
WriteFile
CloseHandle
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
MultiByteToWideChar
GetWindowsDirectoryA
GetSystemDirectoryA
wsprintfA
DrawIcon
DestroyWindow
UnregisterClassA
DefWindowProcA
CharNextA
GetWindowLongA
SetWindowLongA
DispatchMessageA
PeekMessageA
IsWindow
TranslateMessage
SendMessageA
FindWindowA
RegisterClassA
GetCursorPos
KillTimer
LoadIconA
SetWindowPos
GetDlgItem
EndDialog
GetSysColor
MoveWindow
GetClientRect
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
SetCursor
GetForegroundWindow
GetCapture
SetTimer
LoadBitmapA
PtInRect
IsDlgButtonChecked
SetForegroundWindow
EnableWindow
GetDlgItemTextA
SetClassLongA
CheckDlgButton
CheckRadioButton
GetWindowRect
DialogBoxParamA
MessageBoxA
ShowWindow
SetDlgItemTextA
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
CreateAcceleratorTableA
CreateWindowExA
RegisterClassExA
LoadCursorA
GetClassInfoExA
GetDesktopWindow
SetFocus
GetFocus
GetWindow
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
FillRect
ReleaseCapture
GetClassNameA
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
GetObjectA
GetStockObject
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetMalloc
CLSIDFromProgID
CoCreateGuid
CoTaskMemAlloc
CoUninitialize
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CoInitialize
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
VarUI4FromStr
SysAllocString
SysAllocStringLen
VarBstrCat
SysFreeString
SysStringLen
ImageList_Draw
ord17
InitCommonControlsEx
ImageList_LoadImageA
ImageList_Destroy
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetQueryDataAvailable
InternetReadFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ