Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
164d34442ac266b6cec2bda3478f8db4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
164d34442ac266b6cec2bda3478f8db4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
164d34442ac266b6cec2bda3478f8db4_JaffaCakes118
Size
298KB
MD5
164d34442ac266b6cec2bda3478f8db4
SHA1
56c6813b5b2010ac6e0fa6cca976840b6875bbf8
SHA256
936b8484021aaf4350a2b2678649b7e1e6d0f62c1375f2c25c63f76b6ff6a6e0
SHA512
9ca6d8ea78cc543d80894089101b80f9be7457dc2f37388a2e5a560adea6971a7964510ffa0d65d926395053b38fd18884b0eb05035f22ef3532c0b3f006660a
SSDEEP
6144:oMrve0Sg8n4OPF2713Jtv0TORlP/RQo3FIU:i2Okp3JtvWOqo3FIU
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindClose
FindFirstFileA
GetTempFileNameA
ReadFile
TerminateProcess
WaitForSingleObject
CreateProcessA
GetPrivateProfileStringA
FlushFileBuffers
WriteConsoleW
SetEndOfFile
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
GetFileType
LCMapStringW
LoadLibraryW
GetVersionExA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleFileNameW
GetStdHandle
HeapCreate
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
GetFileAttributesA
EncodePointer
DecodePointer
ExitProcess
RtlUnwind
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
LocalFree
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
LoadLibraryA
CreateMutexA
CreateDirectoryA
SetCurrentDirectoryA
Sleep
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
SetLastError
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleFileNameA
MulDiv
lstrcmpA
GetCurrentProcess
FlushInstructionCache
IsDBCSLeadByte
lstrcmpiA
lstrlenA
GetTempPathA
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetProcAddress
WideCharToMultiByte
DeleteFileA
CreateFileA
WriteFile
CloseHandle
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
MultiByteToWideChar
GetWindowsDirectoryA
GetSystemDirectoryA
wsprintfA
DrawIcon
DestroyWindow
UnregisterClassA
DefWindowProcA
CharNextA
GetWindowLongA
SetWindowLongA
DispatchMessageA
PeekMessageA
IsWindow
TranslateMessage
SendMessageA
FindWindowA
RegisterClassA
GetCursorPos
KillTimer
LoadIconA
SetWindowPos
GetDlgItem
EndDialog
GetSysColor
MoveWindow
GetClientRect
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
SetCursor
GetForegroundWindow
GetCapture
SetTimer
LoadBitmapA
PtInRect
IsDlgButtonChecked
SetForegroundWindow
EnableWindow
GetDlgItemTextA
SetClassLongA
CheckDlgButton
CheckRadioButton
GetWindowRect
DialogBoxParamA
MessageBoxA
ShowWindow
SetDlgItemTextA
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
CreateAcceleratorTableA
CreateWindowExA
RegisterClassExA
LoadCursorA
GetClassInfoExA
GetDesktopWindow
GetFocus
GetWindow
SetFocus
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
FillRect
ReleaseCapture
GetClassNameA
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
DeleteDC
GetObjectA
GetStockObject
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetMalloc
CLSIDFromProgID
CoCreateGuid
CoTaskMemAlloc
CoUninitialize
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CoInitialize
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
VarUI4FromStr
SysAllocString
SysAllocStringLen
VarBstrCat
SysFreeString
SysStringLen
ImageList_Draw
ord17
InitCommonControlsEx
ImageList_LoadImageA
ImageList_Destroy
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetQueryDataAvailable
InternetReadFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ