Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
543a82b4559fdf1e08a56ea5bb14c139_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
543a82b4559fdf1e08a56ea5bb14c139_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
543a82b4559fdf1e08a56ea5bb14c139_JaffaCakes118
Size
170KB
MD5
543a82b4559fdf1e08a56ea5bb14c139
SHA1
a6b120d6ea7b939667c05348c007c86c307466cf
SHA256
973c7f8c82b55658e69203795d9aa47326254629e2cbf9bf3363f99f951bce20
SHA512
4decd4fff3dc468af7a6f7b7189e6fbb7d5b34467d70fa59473026aac94301f724f1f438526390061eb71e42cecc944af7a42b97abafadc9e230ee0b5a3bb535
SSDEEP
3072:bLbjKmmfcRygt+sX4LdVZtJ6rrRczBpb6K3yGHw6rI2Z+yAVpWiP1bd:bLPK/fcRVnIHZtSrRc9cMk6kTTbd
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReadFile
LoadLibraryA
GetProcAddress
GetWindowsDirectoryW
lstrcatW
CreateFileW
GetCommProperties
SetHandleCount
SetThreadExecutionState
IsBadWritePtr
EraseTape
GetConsoleAliasExesW
IsBadReadPtr
GetDiskFreeSpaceW
CreateJobObjectW
lstrcpyA
UnlockFile
SetConsoleActiveScreenBuffer
ScrollConsoleScreenBufferW
GlobalMemoryStatus
SetHandleInformation
BuildCommDCBAndTimeoutsW
SizeofResource
Module32FirstW
SetConsoleCursorInfo
HeapFree
GetHandleInformation
PurgeComm
CreateMutexA
GetPrivateProfileStructW
LockFile
LCMapStringA
SetCalendarInfoW
CancelDeviceWakeupRequest
MoveFileWithProgressW
WritePrivateProfileSectionW
GlobalAddAtomA
BackupRead
GlobalDeleteAtom
AssignProcessToJobObject
GetConsoleAliasesLengthA
FoldStringW
FreeLibraryAndExitThread
GetSystemPowerStatus
GetOEMCP
GetCurrentThread
BuildCommDCBAndTimeoutsA
PeekNamedPipe
IsBadStringPtrA
GenerateConsoleCtrlEvent
GetThreadLocale
GetDriveTypeW
SetFileAttributesW
ReadProcessMemory
EndUpdateResourceA
SetCommBreak
GetTempPathA
ClearCommError
GetComputerNameW
SetConsoleTitleA
WriteProfileStringW
SetFilePointerEx
InterlockedCompareExchange
GlobalGetAtomNameA
lstrlenA
OutputDebugStringA
Heap32First
GetCurrentDirectoryW
GlobalAlloc
GetNumberOfConsoleMouseButtons
ReadConsoleOutputA
OpenProcess
GetSystemInfo
PeekConsoleInputA
SetVolumeMountPointA
GetTempFileNameW
SetProcessWorkingSetSize
GlobalHandle
GetLogicalDriveStringsA
SetDefaultCommConfigA
Process32Next
FindNextVolumeMountPointW
IsDebuggerPresent
AllocConsole
GetConsoleScreenBufferInfo
UnmapViewOfFile
Process32NextW
EnumSystemCodePagesA
GetCommandLineA
GetLogicalDriveStringsW
WritePrivateProfileStructW
GetPrivateProfileStringW
GetVolumePathNameW
FindCloseChangeNotification
CreateEventA
GetConsoleTitleW
SetClassLongA
PostQuitMessage
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
LoadIconA
LoadCursorA
RegisterClassExA
CreateDialogParamA
GetWindowTextLengthA
ToAscii
SetWinEventHook
ScrollWindowEx
mouse_event
IsCharLowerW
LoadCursorFromFileW
SetDeskWallpaper
GetClipboardSequenceNumber
OpenIcon
ChangeMenuA
GetKeyboardLayoutList
GetMenuDefaultItem
IsWindowEnabled
UnhookWindowsHook
DrawEdge
FindWindowExW
TrackPopupMenu
MonitorFromRect
IsRectEmpty
DdeQueryStringA
EnumDisplaySettingsW
IMPSetIMEW
GetSystemMenu
ShowCursor
GetWindowPlacement
CreateIconIndirect
GetClipboardViewer
GetUserObjectSecurity
SetWindowsHookW
GetQueueStatus
MessageBoxIndirectA
EnumThreadWindows
GetWindowTextLengthW
LoadMenuIndirectA
CheckDlgButton
GetWindowRect
GetCursor
EnableMenuItem
InvertRect
EnumDesktopsW
WaitMessage
ScrollDC
EnumPropsA
ChangeMenuW
GetForegroundWindow
DdeFreeStringHandle
GetSysColorBrush
AllowSetForegroundWindow
AppendMenuA
CopyImage
GetUserObjectInformationA
FindWindowW
GetKeyboardLayout
OpenDesktopA
CreateDialogIndirectParamW
OemKeyScan
ChildWindowFromPoint
GetCursorInfo
CreateCursor
GetWindowRgn
GetShellWindow
EnumWindows
RegisterDeviceNotificationA
GetMessagePos
SetProcessWindowStation
GetClassLongW
IMPGetIMEW
WaitForInputIdle
ShowOwnedPopups
GetInputState
GetGuiResources
CascadeWindows
RegisterShellHookWindow
GetTitleBarInfo
SetShellWindow
SetSysColors
GetIconInfo
EndDeferWindowPos
LoadStringW
UpdateLayeredWindow
CharLowerBuffW
GetClipboardFormatNameA
ChildWindowFromPointEx
CharPrevExA
GetNextDlgTabItem
SystemParametersInfoA
GetStockObject
DeleteObject
CreateSolidBrush
memset
RegOpenKeyExW
DragQueryFile
FindExecutableA
SHFreeNameMappings
DuplicateIcon
ExtractIconExW
SHGetDataFromIDListA
SHGetDesktopFolder
DoEnvironmentSubstW
SHInvokePrinterCommandW
SHLoadInProc
SHGetPathFromIDListA
SHGetDiskFreeSpaceExW
SHQueryRecycleBinW
ShellHookProc
WOWShellExecute
ShellAboutW
SHGetFileInfoA
SHEmptyRecycleBinA
Shell_NotifyIconW
ShellExecuteW
ExtractAssociatedIconExW
SHFileOperationA
SHGetInstanceExplorer
SHGetFolderPathW
SHGetIconOverlayIndexW
SHFormatDrive
SHGetFolderLocation
ShellExecuteExW
SHIsFileAvailableOffline
SHLoadNonloadedIconOverlayIdentifiers
SHCreateDirectoryExW
DragQueryFileW
SHPathPrepareForWriteA
SHGetSpecialFolderPathW
ExtractAssociatedIconExA
SHGetPathFromIDList
SHChangeNotify
SHAddToRecentDocs
SHGetFileInfo
SHGetSpecialFolderLocation
SHBrowseForFolderW
ExtractIconEx
SHBrowseForFolder
ShellExecuteA
ExtractIconExA
SHCreateProcessAsUserW
SHGetIconOverlayIndexA
SHQueryRecycleBinA
Shell_NotifyIcon
ShellExecuteEx
SHAppBarMessage
SHBrowseForFolderA
SHEmptyRecycleBinW
StrCmpNIW
StrRChrIW
StrChrW
StrCmpNA
StrCmpNIA
StrChrIA
StrRChrA
StrRChrIA
StrRChrW
StrStrIA
StrRStrIA
StrChrA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ