Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
13b49a9a2625c8c421e5538ca538e403_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13b49a9a2625c8c421e5538ca538e403_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
13b49a9a2625c8c421e5538ca538e403_JaffaCakes118
Size
112KB
MD5
13b49a9a2625c8c421e5538ca538e403
SHA1
af62a09c18a649dbe2ba97ef08aea1fbe1d78a73
SHA256
67fe32bc6440b8339000b38a04a5af527113bd39b1a94277297b1e20b5991a35
SHA512
fb7c3aa13ab90a02a5baf853cdf15c1bbf69f8efed474fbf362fe271c2d5c876e35becf32ebbae7f8cca74ff85ff3a268fe1a178d443fdfc92eefce3c8126396
SSDEEP
1536:HfJcCBE+1KWoklsnEq17cZXCpuVkX1eeD2wORJKCp7Y+YpNnn:HfJcCV1KWoCshIXCp+kX1eeLORJKMM7n
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord741
ord1308
ord2176
ord2370
ord605
ord354
ord3182
ord4262
ord5203
ord4244
ord1401
ord5912
ord6724
ord1551
ord1670
ord1671
ord2020
ord4890
ord4212
ord5182
ord1794
ord1565
ord2160
ord4735
ord784
ord911
ord908
ord6067
ord4580
ord266
ord265
ord3641
ord5712
ord1903
ord3195
ord620
ord1063
ord618
ord370
ord762
ord2271
ord297
ord3934
ord5563
ord2902
ord3997
ord5529
ord3760
ord5613
ord5403
ord2468
ord3683
ord4541
ord566
ord3333
ord4481
ord2838
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord757
ord3684
ord2095
ord1191
ord326
ord709
ord5523
ord3401
ord3761
ord5642
ord5640
ord5731
ord5727
ord6037
ord5588
ord501
ord3473
ord642
ord4236
ord1558
ord1637
ord4951
ord3397
ord6754
ord6752
ord3287
ord3161
ord1279
ord5637
ord602
ord6062
ord347
ord3180
ord5719
ord5921
ord5401
ord5414
ord5647
ord5888
ord6057
ord4161
ord6054
ord5608
ord6060
ord5611
ord2527
ord2075
ord4001
ord4123
ord5641
ord2654
ord502
ord2264
ord2083
ord3163
ord2367
ord2372
ord753
ord563
ord6065
ord1425
ord1009
ord658
ord651
ord3230
ord4238
ord2092
ord6120
ord2794
ord3302
ord5866
ord3879
ord416
ord5634
ord2882
ord2866
ord4353
ord2873
ord2585
ord3402
ord5873
ord3651
ord1591
ord6725
ord5915
ord1620
ord1617
ord3946
ord1402
ord4240
ord5152
ord1908
ord5073
ord6275
ord4185
ord5214
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord2991
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4261
ord3317
ord572
ord1280
ord3204
ord2368
ord1934
ord310
ord1123
ord3210
ord1084
ord1185
ord304
ord2322
ord781
ord907
ord876
ord578
ord1187
ord764
ord1207
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_decode_pointer
_access
__CxxFrameHandler3
memset
_setmbcp
_tzset
_stricmp
_mbsnbcpy
_mbsrchr
_mbstok
strncpy
_snprintf
__argv
__argc
_mbsstr
_mktime64
memcpy
_except_handler4_common
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_controlfp_s
GetModuleFileNameA
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
GetPrivateProfileStringA
CreateFileA
GetFileSize
ReadFile
CloseHandle
SetFilePointer
GetFileInformationByHandle
GetFileType
MapViewOfFile
CreateFileMappingA
DuplicateHandle
SystemTimeToFileTime
GetLocalTime
UnmapViewOfFile
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoA
lstrcpyA
GetNumberFormatA
lstrcpynA
lstrlenA
GetProcAddress
InterlockedExchange
MultiByteToWideChar
GetLastError
WriteFile
GetModuleHandleA
SetLastError
WinExec
GetCurrentProcess
FileTimeToDosDateTime
GetACP
GetThreadLocale
GetVersionExA
FileTimeToSystemTime
IsWindow
MessageBeep
SetWindowLongA
RegisterWindowMessageA
DrawEdge
UpdateWindow
GetFocus
TabbedTextOutA
InvalidateRect
InflateRect
GetSystemMetrics
GetSysColor
RedrawWindow
GetClientRect
DrawIcon
FillRect
GetParent
MessageBoxA
SetCapture
SetFocus
ReleaseCapture
SetActiveWindow
GetAsyncKeyState
wsprintfA
DestroyCursor
CopyIcon
GetMessagePos
SetCursor
LoadIconA
LoadCursorA
SetTimer
KillTimer
ReleaseDC
GrayStringA
GetDC
DrawTextA
SendMessageA
GetWindowRect
LockWindowUpdate
EnableWindow
ScreenToClient
PtInRect
DrawTextExA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetCurrentObject
GetTextExtentPoint32A
BitBlt
GetBkColor
CreateCompatibleDC
CreateCompatibleBitmap
GetStockObject
GetObjectA
CreateFontIndirectA
CreateRectRgn
RegOpenKeyExA
RegCloseKey
RegQueryValueA
ExtractIconA
ShellExecuteExA
ShellExecuteA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ