Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0a1afb70d4df341e02043c2ebeb21aff_JaffaCakes118.exe
Resource
win7-20240903-en
Target
0a1afb70d4df341e02043c2ebeb21aff_JaffaCakes118
Size
1.5MB
MD5
0a1afb70d4df341e02043c2ebeb21aff
SHA1
48f9c2ecfacdd1371b6deeac3b847f1fdf4d7c9f
SHA256
0b1458cada17a90763602fde8a1f7deae985703811c1f1420879b2b472147e01
SHA512
51fb7d7915d4e0c9048b453e63d025b391eeaae0b9e4bf46621bc7819e596bdca5f52834887daf1cb98dc09884063ab337da3a4f367860a330a6caf22d792823
SSDEEP
24576:4s1fPnFx/289qRgm1dex0boIRn+wplwk5dGqV0e3uvBrUgLJq11hDT1PTH7Ezq3A:Lt9xWZ5pVVevho1hNPTbxk8Il
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\tfs.vs2012\admin\windows\MAIN\Installer.QuickStart.Application\ReleaseNoMFC\quickstart.pdb
ImageList_Create
InitCommonControlsEx
ImageList_Add
MultiByteToWideChar
FileTimeToSystemTime
SystemTimeToFileTime
GetLocalTime
GetLastError
FindResourceExW
FindResourceW
LoadResource
LockResource
GetTickCount
CloseHandle
Sleep
GetCurrentThreadId
SetUnhandledExceptionFilter
ReleaseMutex
RtlCaptureStackBackTrace
CreateMutexA
WaitForSingleObject
SizeofResource
InitializeCriticalSectionAndSpinCount
GetTempPathA
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
OutputDebugStringW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
GetStringTypeW
GetModuleFileNameW
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
InterlockedIncrement
SetLastError
RtlUnwind
LoadLibraryExW
ExitThread
CreateThread
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleHandleExW
ExitProcess
InterlockedDecrement
DecodePointer
EncodePointer
HeapSize
HeapReAlloc
HeapDestroy
AreFileApisANSI
DeleteFileW
DeleteCriticalSection
WideCharToMultiByte
RaiseException
FormatMessageA
GetModuleHandleA
LocalAlloc
lstrlenA
LocalFree
FindFirstFileA
FindNextFileA
FindClose
CreateDirectoryA
GetSystemTime
GetTempFileNameA
DeleteFileA
RemoveDirectoryA
SetFileAttributesA
CopyFileA
GetFileAttributesA
GetModuleFileNameA
GetCurrentDirectoryA
GetFullPathNameA
GetLongPathNameA
GetVersionExA
GetSystemInfo
GetCurrentProcess
GetWindowsDirectoryA
GetSystemDirectoryA
ExpandEnvironmentStringsA
HeapAlloc
GetProcessHeap
HeapFree
LoadLibraryA
GetProcAddress
FreeLibrary
GetTimeZoneInformation
CreateFileA
OpenProcess
GetExitCodeProcess
GetPrivateProfileStringA
GetPrivateProfileIntA
WritePrivateProfileStringA
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
EnumResourceNamesA
EnumResourceLanguagesA
FindResourceA
LoadLibraryExA
FindResourceExA
GetFileSize
ReadFile
WriteFile
SetFilePointer
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
Module32First
Module32Next
GetCurrentProcessId
CreateEventA
WaitForSingleObjectEx
ResetEvent
SetEvent
GetUserDefaultUILanguage
VirtualQuery
GetCurrentThread
GetFullPathNameW
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
QueryPerformanceCounter
InterlockedCompareExchange
UnlockFile
LockFile
UnlockFileEx
GetSystemTimeAsFileTime
InitializeCriticalSection
LoadLibraryW
FormatMessageW
LeaveCriticalSection
GetFileAttributesW
CreateFileW
FlushFileBuffers
GetTempPathW
LockFileEx
EnterCriticalSection
GetDiskFreeSpaceW
CreateFileMappingA
GetDiskFreeSpaceA
GetFileAttributesExW
SetWindowLongA
GetWindowLongA
PostMessageA
GetWindowTextLengthA
GetWindowTextA
ScreenToClient
SetWindowTextA
IsWindow
ClientToScreen
SetWindowPos
MessageBoxA
SetTimer
DestroyWindow
SetForegroundWindow
EnableWindow
KillTimer
GetParent
SetParent
GetWindowRect
SendMessageA
ShowWindow
UpdateWindow
GetSystemMetrics
GetShellWindow
GetWindowThreadProcessId
LoadStringA
EnumWindows
IsWindowEnabled
FindWindowExA
GetClassNameA
EnumChildWindows
FindWindowA
GetDesktopWindow
SetCursor
LoadCursorA
ReleaseCapture
GetKeyboardState
CreatePopupMenu
DestroyMenu
AppendMenuA
TrackPopupMenu
CreateWindowExA
GetClassInfoExA
RegisterClassExA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
CallWindowProcA
DefWindowProcA
LoadBitmapA
LoadImageA
DialogBoxParamA
CreateDialogParamA
EndDialog
GetDlgItem
SendMessageW
CopyRect
InflateRect
FrameRect
BeginPaint
EndPaint
MessageBoxExA
WaitForInputIdle
PostQuitMessage
LoadAcceleratorsA
SetDlgItemTextA
GetCursorPos
OffsetRect
SystemParametersInfoA
AdjustWindowRectEx
SetClassLongA
LoadIconA
IsIconic
GetFocus
SetFocus
IsWindowVisible
InvalidateRgn
InvalidateRect
MoveWindow
GetClientRect
Shell_NotifyIconA
ShellExecuteExA
SHGetSpecialFolderPathA
CoCreateGuid
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
OleUninitialize
CoInitializeSecurity
OleInitialize
StringFromGUID2
VariantClear
SafeArrayDestroy
SafeArrayUnaccessData
VariantChangeType
SysFreeString
SysAllocStringLen
SysAllocString
VariantInit
SafeArrayCreateVector
SafeArrayAccessData
SysStringLen
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
ExpandEnvironmentStringsForUserA
EnumProcesses
GetModuleFileNameExA
InternetReadFileExA
InternetSetOptionA
InternetErrorDlg
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetCombineUrlA
InternetGetCookieA
InternetSetCookieA
FindCloseUrlCache
InternetCloseHandle
InternetOpenA
InternetSetStatusCallback
HttpQueryInfoA
InternetConnectA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
SHDeleteEmptyKeyA
PathIsDirectoryEmptyA
PathRemoveFileSpecA
UrlEscapeA
PathStripPathA
PathCombineA
PathFindExtensionA
PathRenameExtensionA
GdipDeleteGraphics
GdipCreateFromHDC
GdipSetCompositingMode
IsValidURL
PatBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
SetWindowOrgEx
BitBlt
DeleteDC
SelectObject
GetStockObject
GetObjectA
ImpersonateLoggedOnUser
RegQueryInfoKeyA
RegEnumKeyExA
RevertToSelf
OpenProcessToken
GetTokenInformation
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
SetTokenInformation
LookupPrivilegeValueA
DuplicateTokenEx
GetLengthSid
AdjustTokenPrivileges
RegOpenCurrentUser
RegOpenUserClassesRoot
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ