Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
30aaf1aeecbf1ff2e04e67ae5f334ba2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30aaf1aeecbf1ff2e04e67ae5f334ba2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
30aaf1aeecbf1ff2e04e67ae5f334ba2_JaffaCakes118
Size
268KB
MD5
30aaf1aeecbf1ff2e04e67ae5f334ba2
SHA1
758898d56e581f13dc84323891c43557afd13fd7
SHA256
68c6b0e372bdb46b6697253b77bdd26286f9424f33fd51d9ab780ec2112ee9b4
SHA512
c33f6fa12b545437e8e86dcc3479f21ac80448ba719ca3a7eebe901de27ab876e6e86f2dcdd2ffea1c7fe1c84f2152d70c8377eda84e825cf11554c7787cf716
SSDEEP
6144:80qKCrLJIg/szNP8csQl5E9qmczvhUwecPg1gCEZEC:8hKCZH/sCK5ftc6EC
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetThreadTimes
GetVersionExA
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
OpenProcess
ReleaseMutex
GetStartupInfoW
SetPriorityClass
SetProcessAffinityMask
SetProcessShutdownParameters
TerminateProcess
VerifyVersionInfoW
VirtualAlloc
VirtualFree
WaitForSingleObject
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
GetProcessHeap
GetProcessAffinityMask
GetPriorityClass
GetNumberFormatW
GetModuleHandleW
GetLocaleInfoW
GetLastError
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCommandLineW
FreeLibrary
FormatMessageW
ExitProcess
EnterCriticalSection
DeleteCriticalSection
CreateThread
CreateProcessW
CreateMutexW
CreateEventW
GetSystemDirectoryW
lstrcatW
CreateFileW
GetModuleHandleA
GetProcAddress
SetFilePointer
lstrlenA
WriteFile
GetTempPathA
lstrcatA
CreateFileA
SetEvent
CloseHandle
GetDC
GetDCEx
GetDesktopWindow
GetDialogBaseUnits
GetDlgItem
GetForegroundWindow
GetGuiResources
GetClassInfoW
GetLastActivePopup
GetMenu
GetMenuItemInfoW
GetMessageW
GetProcessWindowStation
GetShellWindow
GetSubMenu
GetSysColor
GetSystemMetrics
GetThreadDesktop
GetUpdateRgn
GetWindow
GetWindowLongA
GetWindowLongW
GetWindowRect
GetWindowThreadProcessId
InternalGetWindowText
InvalidateRect
IsDialogMessageW
IsDlgButtonChecked
IsHungAppWindow
IsIconic
IsWindow
IsWindowVisible
IsZoomed
KillTimer
LoadAcceleratorsW
LoadIconW
LoadImageW
LoadMenuW
LoadStringW
MapWindowPoints
MessageBeep
MessageBoxW
MonitorFromRect
MoveWindow
OpenDesktopW
OpenIcon
OpenWindowStationW
PostMessageW
PostQuitMessage
PostThreadMessageW
RegisterClassW
RegisterWindowMessageW
GetCursorPos
RemoveMenu
SendMessageTimeoutW
SendMessageW
SetFocus
SetForegroundWindow
SetMenu
SetMenuDefaultItem
SetProcessWindowStation
SetThreadDesktop
SetTimer
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
ShowWindowAsync
SwitchToThisWindow
SystemParametersInfoW
TileWindows
TrackPopupMenuEx
TranslateAcceleratorW
TranslateMessage
UpdateWindow
wsprintfW
GetAsyncKeyState
FindWindowW
FillRect
EnumWindows
EnumWindowStationsW
EnumDesktopsW
EndTask
EndPaint
EndDialog
EndDeferWindowPos
EnableWindow
EnableMenuItem
DrawEdge
DispatchMessageW
DialogBoxParamW
DestroyWindow
DestroyMenu
DestroyIcon
DeleteMenu
DeferWindowPos
DefWindowProcW
CreateDialogParamW
CloseWindowStation
CloseDesktop
CheckMenuRadioItem
CheckMenuItem
CheckDlgButton
CharLowerBuffW
GetClientRect
ReleaseDC
GetClassLongW
CascadeWindows
CallWindowProcW
BeginPaint
BeginDeferWindowPos
AllowSetForegroundWindow
GetKeyState
SelectObject
Rectangle
MoveToEx
LineTo
GetStockObject
GetDeviceCaps
FillRgn
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgn
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
CombineRgn
SetRectRgn
BitBlt
RegQueryValueExW
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegOpenKeyExA
RegSetValueExW
RegOpenKeyW
RegQueryValueExA
RegOpenKeyExW
Shell_NotifyIconW
ShellAboutW
ImageList_Create
ImageList_Remove
ImageList_ReplaceIcon
CreateStatusWindowW
ImageList_SetIconSize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ