Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
05e1c00683dc463f9dc64ad3941f851a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
05e1c00683dc463f9dc64ad3941f851a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
05e1c00683dc463f9dc64ad3941f851a_JaffaCakes118
Size
77KB
MD5
05e1c00683dc463f9dc64ad3941f851a
SHA1
522da5905a4cacdf58dde50d64d635f8f72a3cd1
SHA256
7e99ce91f03941412513d470af8a6718296b6b7e1110f33196ef57f14df61b69
SHA512
a7988325f6103e579985d9781c746e1afceea4edd8c2353b7c0c5b148ed7681feaf58eb4a45dadd6f6570fcb3ab9b4b994bed872c39e1b0d2b0caf31a3098a61
SSDEEP
768:Ei7FaFipTmxf+ldLNsrjEsmMYzizG5JrBIjcXcOvZ6ewDdL7UxoeYxeL7sp7:1EFidAf+lfsc9rBIYi7EoFxew7
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
Sleep
CreateProcessA
SetErrorMode
GetCurrentProcessId
FindFirstFileA
FindNextFileA
GetCurrentThread
FormatMessageA
SetFileAttributesA
GetWindowsDirectoryA
CreateDirectoryA
LocalAlloc
CopyFileA
LocalFree
GetProcessHeap
HeapAlloc
HeapReAlloc
HeapFree
TerminateProcess
GetCurrentProcess
GetLastError
WideCharToMultiByte
GetModuleHandleA
GetProcAddress
lstrcpyA
lstrlenA
CloseHandle
GetVersionExA
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
GetStringTypeA
ExitProcess
RtlUnwind
GetFileType
CreateFileA
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetCommandLineA
GetVersion
WriteFile
ReadFile
SetFilePointer
SetHandleCount
GetStdHandle
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
SetStdHandle
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
FlushFileBuffers
GetWindowThreadProcessId
GetWindowTextA
EnumWindows
AllocateAndInitializeSid
ControlService
OpenServiceA
StartServiceA
LookupAccountSidA
DeleteAce
AddAccessDeniedAce
AddAccessAllowedAce
GetNamedSecurityInfoA
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
AddAce
SetNamedSecurityInfoA
OpenThreadToken
EqualSid
EqualPrefixSid
SetEntriesInAclA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
LookupAccountNameA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
CreateServiceA
CloseServiceHandle
StartServiceCtrlDispatcherA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE