Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
11f32a4caf73dbb0bf0f0ea27f84f241_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11f32a4caf73dbb0bf0f0ea27f84f241_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
11f32a4caf73dbb0bf0f0ea27f84f241_JaffaCakes118
Size
1.0MB
MD5
11f32a4caf73dbb0bf0f0ea27f84f241
SHA1
9f9f90fe08443ee60c996ab0ceb7cfa74e5018ef
SHA256
4422615f8bb8acf1d8f61f3da35e87a87a88670baaf5cf49141c50a178d9bd02
SHA512
ad38c0c025c040e3681d917d64705381aa1aa82e922ac5cb45e64a7ba7e06a9de73c578755c8d7b80bd68e45d880d6438bdc6627216d066b6411d264b8580101
SSDEEP
24576:7UcZTrcS6UBZNwYjO9cilY2f7hgEqNe9OwNDeNO:gqTIS6UBZNwf9c/mzqhw5e
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProfilesDirectoryA
DeleteCriticalSection
GetCurrentThreadId
ExitProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
FindResourceA
LoadResource
SizeofResource
IsDBCSLeadByte
GetModuleHandleA
LoadLibraryExA
lstrcpynA
WritePrivateProfileStringA
CreateThread
WaitForSingleObject
SleepEx
CreateProcessA
GetComputerNameA
GetVolumeInformationA
GetCurrentProcessId
ExpandEnvironmentStringsA
OpenProcess
GlobalFree
HeapReAlloc
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
QueryPerformanceCounter
EnterCriticalSection
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStringTypeW
GetStringTypeA
HeapSize
GetStdHandle
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedCompareExchange
FlushFileBuffers
WriteConsoleW
CreateFileA
GetFileSize
lstrcmpA
SetFilePointer
lstrlenA
MoveFileExA
SetEndOfFile
FreeLibrary
lstrcmpiA
SetLastError
RaiseException
FlushInstructionCache
GlobalUnlock
lstrlenW
HeapAlloc
MultiByteToWideChar
MulDiv
LeaveCriticalSection
WideCharToMultiByte
GlobalAlloc
InitializeCriticalSection
GlobalLock
InterlockedDecrement
InterlockedIncrement
LocalFree
LocalAlloc
CreateDirectoryA
lstrcpyA
DeleteFileA
GetTempPathA
CloseHandle
GetVersionExA
FindNextFileA
GetModuleFileNameA
LoadLibraryA
GetPrivateProfileStringA
FindClose
RemoveDirectoryA
GetProcAddress
GetLastError
FindFirstFileA
lstrcatA
ReadFile
GetExitCodeProcess
GetFileAttributesA
Sleep
WriteFile
GetProcessHeap
GetTickCount
HeapFree
GetCurrentProcess
GetFileType
PostQuitMessage
MoveWindow
GetWindow
LoadCursorA
GetClientRect
UpdateWindow
LoadIconA
SystemParametersInfoA
GetUserObjectSecurity
GetWindowThreadProcessId
GetShellWindow
PostMessageA
CheckRadioButton
IsDlgButtonChecked
DrawTextA
SetCursor
GetWindowRect
EnableWindow
GetDC
GetWindowLongA
CreateWindowExA
DefWindowProcA
ExitWindowsEx
SendMessageA
MessageBoxA
FindWindowA
UnregisterClassA
wsprintfA
CallWindowProcA
GetDlgCtrlID
GetWindowDC
DrawFocusRect
GetMessageA
SetForegroundWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
EndPaint
ClientToScreen
DestroyWindow
GetClassNameA
DestroyAcceleratorTable
ScreenToClient
RegisterClassExA
FillRect
IsChild
GetClassInfoExA
SetCapture
GetFocus
GetParent
InvalidateRgn
CharNextA
SetFocus
GetWindowTextLengthA
RegisterWindowMessageA
BeginPaint
GetWindowTextA
SetWindowLongA
InvalidateRect
CreateAcceleratorTableA
ReleaseDC
GetDlgItem
RedrawWindow
GetDesktopWindow
GetSysColor
SetWindowPos
ShowWindow
IsWindow
ReleaseCapture
SetWindowTextA
SetBkColor
SetTextColor
TextOutA
BitBlt
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
CreateFontA
SetBkMode
GetStockObject
CreateDIBitmap
GetObjectA
IsValidSid
GetSecurityDescriptorOwner
LookupAccountSidA
GetTokenInformation
ConvertSidToStringSidA
RegQueryInfoKeyA
RegCreateKeyExA
RegEnumKeyExA
SetFileSecurityA
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
RegCloseKey
AdjustTokenPrivileges
RegEnumKeyA
RegOpenKeyA
GetUserNameA
RegDeleteValueA
RegOpenKeyExA
LookupPrivilegeValueA
RegCreateKeyA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
ShellExecuteExA
ShellExecuteA
SHGetSpecialFolderPathA
ord680
SHGetFolderPathA
SHFileOperationA
CoTaskMemAlloc
CoGetClassObject
OleUninitialize
CoUninitialize
StringFromGUID2
CreateStreamOnHGlobal
CLSIDFromString
CoInitialize
CoSetProxyBlanket
CoTaskMemRealloc
CoTaskMemFree
CoInitializeEx
CLSIDFromProgID
OleInitialize
OleLockRunning
CoCreateInstance
SysAllocString
SysStringLen
VariantClear
LoadTypeLi
VariantInit
SysAllocStringLen
OleCreateFontIndirect
SysFreeString
LoadRegTypeLi
SysAllocStringByteLen
VarUI4FromStr
StrToIntA
StrStrA
StrNCatA
wnsprintfA
SHDeleteKeyA
PathFileExistsA
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ