Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
28179b28e5803c9c55b414d47dafb552_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28179b28e5803c9c55b414d47dafb552_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
28179b28e5803c9c55b414d47dafb552_JaffaCakes118
Size
1001KB
MD5
28179b28e5803c9c55b414d47dafb552
SHA1
46d4c8fed3bae12fdbfbe3e99a46bdee532e62dd
SHA256
ef0bb4d32e1261b9f5dc2229b5d2775cd91c2d3134e25659c6d4ddf225d0fde6
SHA512
8858aa079047403913013595ce085b96a3c625ce27d4ebd3f0ed06846493f859c1dd6deb5c2e3c6b78b5a2900a03736ec763dac92fd6b500489e431e507b2a5f
SSDEEP
24576:Svt/sogvTr408epZA1QdRjgE5ULsxU/5GFgsV/CXPYbYM50sQN:Kt0fvTs08epZAWdJ6n5uLV/4PR
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProfilesDirectoryA
GlobalUnlock
FlushInstructionCache
RaiseException
SetLastError
EnterCriticalSection
GetModuleHandleA
LoadLibraryExA
DeleteCriticalSection
GetCurrentThreadId
lstrcatA
GetPrivateProfileStringA
lstrcpynA
WritePrivateProfileStringA
CreateThread
WaitForSingleObject
SleepEx
CreateProcessA
GetFileAttributesA
GetFileSize
SetFilePointer
SetEndOfFile
ReadFile
GetComputerNameA
GetVolumeInformationA
RemoveDirectoryA
GetTickCount
GetCurrentProcessId
HeapReAlloc
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
MultiByteToWideChar
GetConsoleMode
GetConsoleCP
RtlUnwind
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStdHandle
HeapCreate
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
GetSystemTimeAsFileTime
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedCompareExchange
CreateFileA
MoveFileExA
GetCurrentProcess
HeapFree
GetProcessHeap
WriteFile
Sleep
GetExitCodeProcess
IsDBCSLeadByte
MulDiv
CreateDirectoryA
LeaveCriticalSection
SizeofResource
InitializeCriticalSection
GlobalLock
InterlockedIncrement
LoadResource
FindResourceA
GetVersionExA
GetCurrentDirectoryA
SetCurrentDirectoryA
InterlockedDecrement
GlobalFree
GlobalAlloc
OpenProcess
HeapAlloc
LoadLibraryA
FreeLibrary
ExitProcess
GetProcAddress
lstrlenA
lstrcmpA
lstrcmpiA
lstrlenW
WideCharToMultiByte
lstrcpyA
DeleteFileA
LocalFree
GetTempPathA
CloseHandle
FindNextFileA
GetModuleFileNameA
LocalAlloc
FindClose
GetLastError
FindFirstFileA
InitializeCriticalSectionAndSpinCount
MessageBoxA
TranslateMessage
IsDialogMessageA
SetFocus
SetForegroundWindow
DefWindowProcA
UnregisterClassA
DispatchMessageA
UpdateWindow
LoadIconA
SystemParametersInfoA
PostMessageA
CheckRadioButton
IsDlgButtonChecked
SetCursor
ClientToScreen
DestroyWindow
FindWindowA
ShowWindow
PostQuitMessage
GetClientRect
SendMessageA
GetDC
GetWindowLongA
ExitWindowsEx
CreateWindowExA
GetClassNameA
DestroyAcceleratorTable
ScreenToClient
IsChild
GetClassInfoExA
SetCapture
DrawTextA
GetFocus
GetParent
InvalidateRgn
CharNextA
GetWindowTextLengthA
RegisterWindowMessageA
GetWindowTextA
CreateAcceleratorTableA
RedrawWindow
GetDesktopWindow
GetSysColor
SetWindowPos
IsWindow
ReleaseCapture
CallWindowProcA
LoadCursorA
GetWindow
MoveWindow
GetWindowRect
FillRect
GetDlgItem
SetWindowTextA
EnableWindow
GetDlgCtrlID
EndPaint
RegisterClassExA
GetWindowDC
BeginPaint
DrawFocusRect
SetWindowLongA
InvalidateRect
ReleaseDC
GetUserObjectSecurity
GetWindowThreadProcessId
GetShellWindow
GetMessageA
CreateDIBitmap
GetDeviceCaps
DeleteObject
CreateCompatibleBitmap
BitBlt
DeleteDC
SetBkColor
CreateCompatibleDC
GetObjectA
CreateSolidBrush
SetTextColor
SelectObject
TextOutA
SetBkMode
GetStockObject
CreateFontA
RegEnumKeyA
RegDeleteValueA
RegQueryInfoKeyA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
AdjustTokenPrivileges
GetUserNameA
IsValidSid
GetSecurityDescriptorOwner
RegOpenKeyExA
LookupPrivilegeValueA
LookupAccountSidA
GetTokenInformation
ConvertSidToStringSidA
RegOpenKeyA
RegCreateKeyA
RegQueryValueExA
RegCloseKey
SetFileSecurityA
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
OpenProcessToken
ord680
SHGetFolderPathA
ShellExecuteA
SHFileOperationA
ShellExecuteExA
OleUninitialize
OleInitialize
StringFromGUID2
CreateStreamOnHGlobal
CoTaskMemFree
CLSIDFromProgID
CoTaskMemRealloc
OleLockRunning
CoSetProxyBlanket
CoGetClassObject
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitializeEx
CLSIDFromString
SysStringLen
VariantClear
SysAllocStringByteLen
LoadTypeLi
VariantInit
SysAllocStringLen
OleCreateFontIndirect
VarUI4FromStr
LoadRegTypeLi
SysAllocString
SysFreeString
AssocQueryStringA
StrStrA
StrNCatA
StrStrIA
wnsprintfA
PathFileExistsA
StrToIntA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ