Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
37dfcde6451936d000f3a4a26f6a2b5f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
37dfcde6451936d000f3a4a26f6a2b5f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
37dfcde6451936d000f3a4a26f6a2b5f_JaffaCakes118
Size
1023KB
MD5
37dfcde6451936d000f3a4a26f6a2b5f
SHA1
b5062b670acccb6c391646aac7a641023264b840
SHA256
fb802cc4225718c9954635e6f2af6eca8e0e3ebc01fe052de7efdec61b2de7bd
SHA512
2f9e3321a0b0b01c22c42969cdc726f4702ee1750f7caa01f9bd59be3d93b61207edd1e45044e4b80d0766b76619ae1b2b3656e99f21cbcfe39801be4aea2a92
SSDEEP
24576:422BcVp5TriS6U4Z3hxCq/VwicuKVmraPmnvLoPRzhB95Lc/UFkQ:T2i5T+S6U4Z3hxCqq6GPOsZFBcUF9
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProfilesDirectoryA
IsDBCSLeadByte
MultiByteToWideChar
GlobalUnlock
FlushInstructionCache
RaiseException
SetLastError
EnterCriticalSection
GetModuleHandleA
LoadLibraryExA
DeleteCriticalSection
GetCurrentThreadId
lstrcpynA
WritePrivateProfileStringA
CreateThread
WaitForSingleObject
SleepEx
CreateProcessA
GetComputerNameA
GetVolumeInformationA
GetCurrentProcessId
ExpandEnvironmentStringsA
OpenProcess
GlobalFree
HeapReAlloc
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
QueryPerformanceCounter
MulDiv
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStringTypeW
GetStringTypeA
HeapSize
GetStdHandle
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
GetSystemTimeAsFileTime
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedCompareExchange
FlushFileBuffers
WriteConsoleW
CreateFileA
GetFileSize
lstrcmpA
SetFilePointer
lstrlenA
MoveFileExA
SetEndOfFile
FreeLibrary
LeaveCriticalSection
SizeofResource
GlobalAlloc
InitializeCriticalSection
GlobalLock
InterlockedIncrement
HeapAlloc
LoadResource
FindResourceA
GetCurrentDirectoryA
SetCurrentDirectoryA
InterlockedDecrement
ExitProcess
lstrcmpiA
lstrlenW
WideCharToMultiByte
LocalFree
LocalAlloc
CreateDirectoryA
lstrcpyA
DeleteFileA
GetTempPathA
CloseHandle
GetVersionExA
FindNextFileA
GetModuleFileNameA
LoadLibraryA
GetPrivateProfileStringA
FindClose
RemoveDirectoryA
GetProcAddress
GetLastError
FindFirstFileA
lstrcatA
ReadFile
GetExitCodeProcess
GetFileAttributesA
Sleep
WriteFile
GetProcessHeap
GetTickCount
HeapFree
GetCurrentProcess
GetFileType
PostQuitMessage
ShowWindow
DispatchMessageA
TranslateMessage
GetClientRect
UpdateWindow
LoadIconA
SystemParametersInfoA
GetUserObjectSecurity
GetWindowThreadProcessId
GetShellWindow
PostMessageA
CheckRadioButton
IsDlgButtonChecked
SetCursor
ClientToScreen
DestroyWindow
GetClassNameA
GetDC
GetWindowLongA
CreateWindowExA
DefWindowProcA
ExitWindowsEx
SendMessageA
MessageBoxA
FindWindowA
UnregisterClassA
wsprintfA
IsDialogMessageA
DestroyAcceleratorTable
ScreenToClient
IsChild
GetClassInfoExA
SetCapture
DrawTextA
GetFocus
GetParent
InvalidateRgn
CharNextA
GetWindowTextLengthA
RegisterWindowMessageA
GetWindowTextA
CreateAcceleratorTableA
RedrawWindow
GetDesktopWindow
GetSysColor
SetWindowPos
IsWindow
ReleaseCapture
CallWindowProcA
LoadCursorA
GetWindow
MoveWindow
GetWindowRect
FillRect
GetDlgItem
SetWindowTextA
EnableWindow
GetDlgCtrlID
EndPaint
RegisterClassExA
GetWindowDC
BeginPaint
DrawFocusRect
SetWindowLongA
InvalidateRect
ReleaseDC
GetMessageA
SetForegroundWindow
SetFocus
GetDeviceCaps
DeleteObject
CreateCompatibleBitmap
BitBlt
DeleteDC
SetBkColor
CreateCompatibleDC
GetObjectA
CreateSolidBrush
SetTextColor
TextOutA
CreateFontA
SetBkMode
GetStockObject
CreateDIBitmap
SelectObject
IsValidSid
GetSecurityDescriptorOwner
LookupAccountSidA
GetTokenInformation
ConvertSidToStringSidA
RegQueryInfoKeyA
RegCreateKeyExA
RegEnumKeyExA
SetFileSecurityA
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
RegCloseKey
AdjustTokenPrivileges
RegEnumKeyA
RegOpenKeyA
GetUserNameA
RegDeleteValueA
RegOpenKeyExA
LookupPrivilegeValueA
RegCreateKeyA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
ShellExecuteExA
ShellExecuteA
ord680
SHGetFolderPathA
SHFileOperationA
OleUninitialize
OleInitialize
StringFromGUID2
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoTaskMemRealloc
CoGetClassObject
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoInitializeEx
OleLockRunning
CreateStreamOnHGlobal
CoSetProxyBlanket
CoCreateInstance
SysFreeString
SysAllocString
SysStringLen
VariantClear
SysAllocStringByteLen
LoadTypeLi
VariantInit
SysAllocStringLen
OleCreateFontIndirect
VarUI4FromStr
LoadRegTypeLi
StrToIntA
StrStrA
StrNCatA
wnsprintfA
SHDeleteKeyA
PathFileExistsA
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ