Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
3caa44b91822dad7fcae6ff7798b20bd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3caa44b91822dad7fcae6ff7798b20bd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
3caa44b91822dad7fcae6ff7798b20bd_JaffaCakes118
Size
298KB
MD5
3caa44b91822dad7fcae6ff7798b20bd
SHA1
c832ccc0d9308481fc0c984cb4347907576b255c
SHA256
e2ae0b3b3c1121ddaab3271a9ab9f036455ae73db8780ffdbfa4191718616241
SHA512
ab69899dd1e6f58eec65470ef7ae27f89d5fa9e5734c5f5d1099f0a9cc025fb738f7e6ab2b9fce5864859b6d8c499ba9f7027a8b0f261c6c099289510076cbe0
SSDEEP
6144:gMrve0Sg8n4OPF2713Jtv0pORlP/RQo3FI7:62Okp3JtvoOqo3FI7
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindClose
FindFirstFileA
GetTempFileNameA
ReadFile
TerminateProcess
WaitForSingleObject
CreateProcessA
GetPrivateProfileStringA
FlushFileBuffers
WriteConsoleW
SetEndOfFile
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
GetFileType
LCMapStringW
LoadLibraryW
GetVersionExA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleFileNameW
GetStdHandle
HeapCreate
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
GetFileAttributesA
EncodePointer
DecodePointer
ExitProcess
RtlUnwind
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
LocalFree
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
LoadLibraryA
CreateMutexA
CreateDirectoryA
SetCurrentDirectoryA
Sleep
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
SetLastError
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleFileNameA
MulDiv
lstrcmpA
GetCurrentProcess
FlushInstructionCache
IsDBCSLeadByte
lstrcmpiA
lstrlenA
GetTempPathA
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetProcAddress
WideCharToMultiByte
DeleteFileA
CreateFileA
WriteFile
CloseHandle
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
MultiByteToWideChar
GetWindowsDirectoryA
GetSystemDirectoryA
wsprintfA
DrawIcon
DestroyWindow
UnregisterClassA
DefWindowProcA
CharNextA
GetWindowLongA
SetWindowLongA
DispatchMessageA
PeekMessageA
IsWindow
TranslateMessage
SendMessageA
FindWindowA
RegisterClassA
GetCursorPos
KillTimer
LoadIconA
SetWindowPos
GetDlgItem
EndDialog
GetSysColor
MoveWindow
GetClientRect
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
SetCursor
GetForegroundWindow
GetCapture
SetTimer
LoadBitmapA
PtInRect
IsDlgButtonChecked
SetForegroundWindow
EnableWindow
GetDlgItemTextA
SetClassLongA
CheckDlgButton
CheckRadioButton
GetWindowRect
DialogBoxParamA
MessageBoxA
ShowWindow
SetDlgItemTextA
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
CreateAcceleratorTableA
CreateWindowExA
RegisterClassExA
LoadCursorA
GetClassInfoExA
GetDesktopWindow
GetFocus
GetWindow
SetFocus
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
FillRect
ReleaseCapture
GetClassNameA
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
DeleteDC
GetObjectA
GetStockObject
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetMalloc
CLSIDFromProgID
CoCreateGuid
CoTaskMemAlloc
CoUninitialize
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CoInitialize
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
VarUI4FromStr
SysAllocString
SysAllocStringLen
VarBstrCat
SysFreeString
SysStringLen
ImageList_Draw
ord17
InitCommonControlsEx
ImageList_LoadImageA
ImageList_Destroy
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetQueryDataAvailable
InternetReadFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ