Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0eff9439325e418ff237a60903450989_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0eff9439325e418ff237a60903450989_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
0eff9439325e418ff237a60903450989_JaffaCakes118
Size
1.1MB
MD5
0eff9439325e418ff237a60903450989
SHA1
4a1dbb20ddfaf4cb1aff176035ef5aa49d050e3d
SHA256
da6e7a5123e1fdd2ebc4eb567bfa5bb976bcbfadb450fcb8d1f27d0ceb99f92c
SHA512
a36e551d4dd69cd86f9b9d9e3f54a3353e8acbd263f61519393cdb5097f30b88afc304b825ecc530eb8dc789e2b68f42e61d5317b2b0ad59c7115f06f863b63e
SSDEEP
24576:zl63YTW1TracGNWc/0vwPOCc9LecoLLErWEsaiUuc7yK4dZ2oX:c3ioTucG/0vw2CczUQrfsbTcOd/
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitCommonControlsEx
UuidCreate
UuidToStringA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
InitializeCriticalSection
DeleteCriticalSection
LoadResource
SizeofResource
FindResourceA
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
LoadLibraryExA
FreeLibrary
IsDBCSLeadByte
GetCurrentThreadId
GetCurrentProcess
SetLastError
GetFileAttributesA
WritePrivateProfileStringA
CreateThread
WaitForSingleObject
CreateProcessA
WinExec
GetComputerNameA
GetVolumeInformationA
GetTickCount
GetCurrentProcessId
HeapReAlloc
SetFilePointer
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetStringTypeW
WideCharToMultiByte
LCMapStringW
LCMapStringA
HeapSize
GetStdHandle
TlsFree
TlsSetValue
LeaveCriticalSection
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapCreate
GetStartupInfoA
GetCommandLineA
GetConsoleMode
GetConsoleCP
GetFileType
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
VirtualAlloc
VirtualFree
WriteConsoleW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
RtlUnwind
GetLocaleInfoA
FlushFileBuffers
GetPrivateProfileStringA
GetConsoleOutputCP
lstrlenA
lstrcatA
lstrcpynA
GetTempPathA
lstrcpyA
HeapFree
WriteFile
DeleteFileA
GetProcessHeap
HeapAlloc
CreateDirectoryA
EnterCriticalSection
RaiseException
MultiByteToWideChar
GetExitCodeProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
Sleep
GetVersionExA
ExitProcess
CreateMutexA
LoadLibraryA
GetProcAddress
lstrcmpA
lstrcmpiA
TlsAlloc
lstrlenW
ReadFile
GetFileSize
CreateFileA
GetModuleFileNameA
CloseHandle
GetLastError
LocalFree
LocalAlloc
SetStdHandle
SetEndOfFile
WriteConsoleA
GetStringTypeA
RedrawWindow
GetParent
IsWindow
GetFocus
SetCursor
UpdateWindow
IsDlgButtonChecked
PostMessageA
CheckRadioButton
SystemParametersInfoA
LoadIconA
ExitWindowsEx
GetWindowTextLengthA
GetWindowTextA
DestroyWindow
LoadCursorA
CharNextA
MessageBoxA
FillRect
GetWindowRect
GetDlgCtrlID
GetDlgItem
EnableWindow
SetWindowTextA
EndPaint
RegisterClassExA
GetWindowDC
BeginPaint
DrawFocusRect
SetWindowLongA
InvalidateRect
ReleaseDC
SetForegroundWindow
FindWindowA
IsDialogMessageA
SetFocus
TranslateMessage
DispatchMessageA
GetMessageA
ShowWindow
SendMessageA
PostQuitMessage
GetClientRect
GetDC
CreateWindowExA
DefWindowProcA
GetWindowLongA
UnregisterClassA
DeleteObject
DeleteDC
BitBlt
GetObjectA
CreateCompatibleDC
CreateSolidBrush
SetBkColor
SetTextColor
SelectObject
TextOutA
CreateFontA
SetBkMode
GetStockObject
CreateDIBitmap
RegSetValueExA
AdjustTokenPrivileges
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
FreeSid
SetFileSecurityA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
RegCloseKey
RegQueryInfoKeyA
OpenProcessToken
CheckTokenMembership
LookupPrivilegeValueA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
SHGetFolderPathA
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
VarUI4FromStr
wnsprintfA
StrStrIA
StrStrA
AssocQueryStringA
StrNCatA
StrToIntA
PathFileExistsA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ