Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
1544368474d6d0c867803b4b6fa46835_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1544368474d6d0c867803b4b6fa46835_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
1544368474d6d0c867803b4b6fa46835_JaffaCakes118
Size
107KB
MD5
1544368474d6d0c867803b4b6fa46835
SHA1
43d3a1502da5319775a268fced7925cb009e4222
SHA256
58cacef8b4ac8e52cb80edc836e4d91887c13338810e917db11b14dd417d8eb5
SHA512
82e6bf7f2b1274cbde77d04afe6702e45fb25cfdf86fc874d37ea64e635301be7dc0f05865909870158541c8bc44a9be8cf876ab61595a4415fccf69b7e7bdfb
SSDEEP
768:rCOo+5gFjwIxGIeDiVhrc0WiPAQB3DKkpsbMDRz0lLCZrECmHnSEECmHnSOECmHJ:rCU6FjwmGXDWjdA8ukpI66LCZoiQC72P
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
VirtualAlloc
GetWindowsDirectoryW
VerSetConditionMask
VerifyVersionInfoW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetTimeFormatW
WideCharToMultiByte
OpenProcess
GetStdHandle
GetConsoleScreenBufferInfo
CloseHandle
GetLogicalDrives
GetDriveTypeW
GetVolumeInformationW
lstrcpynW
FindFirstFileW
FindClose
SetLastError
lstrcmpW
lstrcatW
lstrcmpiW
GetLastError
CompareStringW
FreeLibrary
LoadLibraryW
GetSystemDirectoryW
GetProcAddress
GetComputerNameW
MultiByteToWideChar
VirtualQuery
VirtualFree
lstrlenW
GetSystemWindowsDirectoryW
LocalFree
LocalAlloc
GetCurrentProcess
WaitForMultipleObjects
CreateThread
OpenEventW
CreateEventW
SetEvent
CreateMutexW
GetCommandLineW
GetVersionExW
QueryPerformanceCounter
GetStartupInfoA
GetNumberFormatW
lstrcpyW
LoadLibraryA
CreateHardLinkA
VirtualQueryEx
GetCurrencyFormatA
FindFirstVolumeW
CreateFileMappingW
SetConsoleDisplayMode
IsSystemResumeAutomatic
Process32NextW
GetTapeStatus
ReadConsoleInputA
lstrcpy
ReadFileEx
DeleteVolumeMountPointW
UnlockFileEx
GetTempFileNameA
Module32First
FreeUserPhysicalPages
CopyFileA
SetThreadContext
SetLocaleInfoA
lstrlen
GlobalFindAtomW
GetDiskFreeSpaceW
FindVolumeMountPointClose
GetPrivateProfileIntW
FatalAppExitA
VirtualLock
OpenJobObjectA
lstrcmpi
GetExitCodeProcess
SetFileApisToANSI
HeapWalk
FindNextFileA
CreateNamedPipeA
GetPrivateProfileStringA
SignalObjectAndWait
CopyFileExW
lstrlenA
Process32Next
FindAtomA
DosDateTimeToFileTime
SetLocaleInfoW
BuildCommDCBAndTimeoutsA
ReleaseSemaphore
ReadConsoleInputW
GetThreadLocale
WriteConsoleOutputW
SetErrorMode
FindFirstFileExW
InterlockedExchangeAdd
LoadModule
SetCommMask
EnumSystemLanguageGroupsA
CreateTapePartition
DeleteTimerQueueEx
DeleteTimerQueue
GetUserDefaultLCID
FlushViewOfFile
WaitNamedPipeA
PostQueuedCompletionStatus
SetCalendarInfoW
ResetEvent
EnumCalendarInfoExA
GetTempPathA
GetNamedPipeHandleStateW
Heap32First
Thread32First
LeaveCriticalSection
HeapSize
GetOEMCP
GetShortPathNameA
HeapCreate
ClearCommBreak
GetPrivateProfileStringW
GetThreadSelectorEntry
FreeLibraryAndExitThread
ReleaseMutex
GetPrivateProfileSectionW
GetFileAttributesA
Beep
GetTimeZoneInformation
GetStringTypeA
GetStartupInfoW
SetupComm
WaitNamedPipeW
SetHandleInformation
GetMailslotInfo
_lopen
TerminateThread
SetSystemTimeAdjustment
HeapCompact
GetLongPathNameW
AssignProcessToJobObject
WriteConsoleW
FreeEnvironmentStringsW
DeleteFiber
IsBadCodePtr
GetProcessShutdownParameters
UnregisterWait
GetAtomNameW
Sleep
BuildCommDCBA
ReadConsoleOutputCharacterW
GetConsoleFontSize
SetTapeParameters
GetStockObject
__set_app_type
_except_handler3
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__winitenv
_wtol
malloc
realloc
wcsstr
free
__CxxFrameHandler
_wcsicmp
wcsncpy
_wgetcwd
_c_exit
_exit
_XcptFilter
_cexit
_controlfp
exit
calloc
wcstod
wcstol
wcsncmp
fflush
fprintf
wcschr
strtok
wcslen
_wcsnicmp
sprintf
wcstok
_iob
_vsnprintf
_acmdln
__getmainargs
_vsnwprintf
_ismbcalnum
_winver
_wexecve
wcscmp
_except_handler2
_unlock
_mbbtype
_snprintf
_wsopen
_wfindnext64
_mbctype
iswpunct
_chdir
log10
atexit
modf
_wspawnlpe
_getdcwd
_wexeclpe
_winminor
vfprintf
_beep
_wstat64
_cgets
_execv
wcstombs
log
_ismbcl1
_fcloseall
_CIsqrt
_mbstok
_tell
_jn
_memccpy
_wexecv
_toupper
_abnormal_termination
_strset
__threadid
_ecvt
_filelengthi64
_snwprintf
_CIlog
_chgsign
_ismbcsymbol
__p__winver
_memicmp
_mbstrlen
strrchr
_mbslwr
__unDNameEx
_mbsnset
atoi
vfwprintf
_telli64
memmove
_searchenv
_heapchk
_adj_fdivr_m32
_dstbias
_putw
_adj_fdiv_r
__p__pctype
_wcsupr
_ismbbkprint
__iscsymf
_ismbbtrail
_set_error_mode
ftell
fwprintf
_ismbbgraph
_wopen
_wperror
_inp
_safe_fprem
__p__dstbias
_wgetdcwd
_isatty
__fpecode
_wtoi64
_strdate
_lseeki64
_CIsinh
_rmtmp
_time64
_read
difftime
_eof
_wfreopen
_adj_fdivr_m16i
RegOpenKeyExA
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
LookupAccountSidW
RegSetValueExW
RegConnectRegistryW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ