Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
45cc6c57c8aef4d1e7458e95bdf2537c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45cc6c57c8aef4d1e7458e95bdf2537c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
45cc6c57c8aef4d1e7458e95bdf2537c_JaffaCakes118
Size
431KB
MD5
45cc6c57c8aef4d1e7458e95bdf2537c
SHA1
176c72057f4eb79f59e5f33b757ac81cdd2461e9
SHA256
ed985a8621d95eec5324d0292e358e597a24012882d5f5ddc9bd62ddc24c383f
SHA512
0977e76edfcff06dc88eb87c631ab6e763afdad46bdc818a005d143d12a778fc5a11caab416519e6376b097f027f3ee4546f72b2e6cae6ceb4a03d17e6a803b7
SSDEEP
12288:y9CWI2w7Q3ak0pQR7stAJsrjrgegze9PkqhA:yfI2UQM0stAJsP0egze9sqq
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\tfs.vs2k10\nonelevated\windows\main\Installer.FreezeWrapStub.Application\ReleaseNoMFC\FreezeWrapStub.pdb
InitCommonControlsEx
GetTickCount
CreateMutexA
ReleaseMutex
Sleep
GetLastError
SetFileAttributesA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
FindResourceExA
RaiseException
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
RtlUnwind
CompareStringA
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
ExitProcess
VirtualAlloc
VirtualFree
HeapCreate
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetDateFormatA
GetTimeFormatA
CreateThread
ExitThread
GetStartupInfoA
GetCommandLineA
HeapSize
HeapReAlloc
HeapDestroy
DeleteCriticalSection
FormatMessageA
GetModuleHandleA
LocalAlloc
lstrlenA
LocalFree
BeginUpdateResourceA
HeapAlloc
GetProcessHeap
UpdateResourceA
HeapFree
EndUpdateResourceA
LoadLibraryA
EnumResourceNamesA
EnumResourceLanguagesA
FreeLibrary
LoadLibraryExA
GetUserDefaultUILanguage
GetLocalTime
GetCurrentThreadId
GetPrivateProfileStringA
GetPrivateProfileIntA
MultiByteToWideChar
GetCurrentProcess
WaitForSingleObject
OpenProcess
GetExitCodeProcess
GetProcAddress
CloseHandle
GetTempPathA
GetVersionExA
GetSystemInfo
GetWindowsDirectoryA
GetSystemDirectoryA
ExpandEnvironmentStringsA
CreateEventA
WaitForSingleObjectEx
ResetEvent
SetEvent
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
Module32First
Module32Next
GetCurrentProcessId
FindFirstFileA
FindNextFileA
FindClose
CreateDirectoryA
GetSystemTime
DeleteFileA
RemoveDirectoryA
CopyFileA
GetFileAttributesA
MoveFileA
GetModuleFileNameA
GetLongPathNameA
CreateFileA
GetFileSize
ReadFile
WriteFile
SetFilePointer
SystemTimeToFileTime
FileTimeToSystemTime
GetTimeZoneInformation
WaitForMultipleObjects
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DestroyWindow
IsWindow
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
UpdateWindow
SetForegroundWindow
SetWindowLongA
ShowWindow
EnableWindow
GetWindowLongA
PostMessageA
SendMessageA
DefWindowProcA
CallWindowProcA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
RegisterClassExA
GetClassInfoExA
CreateWindowExA
LoadCursorA
SendMessageW
GetDlgItem
EndDialog
CreateDialogParamA
DialogBoxParamA
LoadIconA
PostQuitMessage
WaitForInputIdle
MessageBoxExA
LoadStringA
GetShellWindow
GetWindowThreadProcessId
GetSystemMetrics
SystemParametersInfoA
EnumWindows
IsWindowEnabled
FindWindowExA
GetClassNameA
EnumChildWindows
FindWindowA
GetDesktopWindow
GetDlgCtrlID
GetSysColor
GetSysColorBrush
LoadAcceleratorsA
SetDlgItemTextA
IsIconic
GetFocus
SetFocus
IsWindowVisible
InvalidateRgn
InvalidateRect
MoveWindow
GetClientRect
GetWindowRect
KillTimer
SetTimer
MessageBoxA
SetWindowPos
ClientToScreen
ScreenToClient
CoTaskMemAlloc
OleInitialize
OleUninitialize
StringFromGUID2
CoCreateGuid
CoCreateInstance
SysAllocStringLen
SysAllocString
VariantInit
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
VariantClear
VariantChangeType
SysFreeString
ExpandEnvironmentStringsForUserA
GetModuleFileNameExA
EnumProcesses
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
InternetErrorDlg
HttpQueryInfoA
InternetCrackUrlA
InternetCombineUrlA
InternetGetCookieA
InternetSetCookieA
InternetCloseHandle
HttpSendRequestA
HttpAddRequestHeadersA
InternetReadFileExA
HttpOpenRequestA
InternetConnectA
InternetSetOptionA
InternetSetStatusCallback
InternetOpenA
PathCombineA
UrlEscapeA
PathStripPathA
PathRenameExtensionA
PathRemoveFileSpecA
SHDeleteEmptyKeyA
SetBkColor
ImpersonateLoggedOnUser
RegCloseKey
RevertToSelf
CreateProcessAsUserA
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
SetTokenInformation
LookupPrivilegeValueA
DuplicateTokenEx
RegCreateKeyExA
GetLengthSid
AdjustTokenPrivileges
RegOpenCurrentUser
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegOpenUserClassesRoot
SHGetSpecialFolderPathA
ShellExecuteExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ