Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2947245c98f941041f2505bc828d57c0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2947245c98f941041f2505bc828d57c0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
2947245c98f941041f2505bc828d57c0_JaffaCakes118
Size
326KB
MD5
2947245c98f941041f2505bc828d57c0
SHA1
440f61bbde54a2a477afe84fc6deab40c1ead59e
SHA256
2acb1a583ed7084d7349687172f36d753ea1de42b6b3ae3e74581e6021edb188
SHA512
62b726ab71d85f4bb294b35cf9ce4165541f33037804c249ad283d9e4ab9eabc7a89b0280b01959e1f62dac30c3057408deb0b5d009994bf37d76f0d6745cabe
SSDEEP
6144:9ZWLqDtt8+3r6EjJdmCeog6zbrLGuwMeo3FLYkO:9vBwC66zbrLGueo3FEkO
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindClose
FindFirstFileA
GetTempFileNameA
ReadFile
TerminateProcess
WaitForSingleObject
CreateProcessA
GetPrivateProfileStringA
FlushFileBuffers
WriteConsoleW
SetEndOfFile
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
GetFileType
LCMapStringW
LoadLibraryW
GetVersionExA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleFileNameW
GetStdHandle
HeapCreate
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
GetFileAttributesA
EncodePointer
DecodePointer
ExitProcess
RtlUnwind
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
LocalFree
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
LoadLibraryA
CreateMutexA
CreateDirectoryA
SetCurrentDirectoryA
Sleep
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
SetLastError
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleFileNameA
MulDiv
lstrcmpA
GetCurrentProcess
FlushInstructionCache
IsDBCSLeadByte
lstrcmpiA
lstrlenA
GetTempPathA
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetProcAddress
WideCharToMultiByte
DeleteFileA
CreateFileA
WriteFile
CloseHandle
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
MultiByteToWideChar
GetWindowsDirectoryA
GetSystemDirectoryA
wsprintfA
DrawIcon
DestroyWindow
UnregisterClassA
DefWindowProcA
CharNextA
GetWindowLongA
SetWindowLongA
DispatchMessageA
PeekMessageA
IsWindow
TranslateMessage
SendMessageA
FindWindowA
RegisterClassA
GetCursorPos
KillTimer
LoadIconA
SetWindowPos
GetDlgItem
EndDialog
GetSysColor
MoveWindow
GetClientRect
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
SetCursor
GetForegroundWindow
GetCapture
SetTimer
LoadBitmapA
PtInRect
IsDlgButtonChecked
SetForegroundWindow
EnableWindow
GetDlgItemTextA
SetClassLongA
CheckDlgButton
CheckRadioButton
GetWindowRect
DialogBoxParamA
MessageBoxA
ShowWindow
SetDlgItemTextA
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
CreateAcceleratorTableA
CreateWindowExA
RegisterClassExA
LoadCursorA
GetClassInfoExA
GetDesktopWindow
SetFocus
GetFocus
GetWindow
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
FillRect
ReleaseCapture
GetClassNameA
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
GetObjectA
GetStockObject
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetMalloc
CLSIDFromProgID
CoCreateGuid
CoTaskMemAlloc
CoUninitialize
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CoInitialize
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
VarUI4FromStr
SysAllocString
SysAllocStringLen
VarBstrCat
SysFreeString
SysStringLen
ImageList_Draw
ord17
InitCommonControlsEx
ImageList_LoadImageA
ImageList_Destroy
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetQueryDataAvailable
InternetReadFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ