Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
54552ab73bc0406e49834d23fa7edb63_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54552ab73bc0406e49834d23fa7edb63_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
54552ab73bc0406e49834d23fa7edb63_JaffaCakes118
Size
222KB
MD5
54552ab73bc0406e49834d23fa7edb63
SHA1
825d9f44753f0d2a2a18cf680a4f908cab85dc5d
SHA256
1d59540b5ecb15d208625e7bb18396a467394df7419d9b50fd9db2d8f6647680
SHA512
a23be97e2254c7f6222efe5ba32377a8cbb96a4e181a67d5b29bd3ac9dc9afbaabbbf00fd5d2389d9eac750a9a217fa26caee7326fcb24dd60d0b4c1883e66f0
SSDEEP
3072:umWGnCiuEo7jnji4OJSa3UypyP4XCiJnim36ZqHQoG3eJPtvgpTeb7:N8pEonnm4qSafpe44mqgzGOcpa
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcessVersion
GetCPInfo
GetOEMCP
GetTickCount
RtlUnwind
HeapFree
HeapAlloc
GetTimeZoneInformation
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
SetStdHandle
GetFileType
GetACP
HeapReAlloc
HeapSize
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WritePrivateProfileStringA
IsBadWritePtr
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalFlags
GetProfileStringA
FileTimeToLocalFileTime
FileTimeToSystemTime
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
SetErrorMode
GetFileTime
MulDiv
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpA
GetCurrentThreadId
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
EnterCriticalSection
lstrcmpiA
GetThreadLocale
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
FormatMessageA
LocalFree
InterlockedDecrement
InterlockedIncrement
Sleep
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FindResourceA
SizeofResource
LoadResource
LockResource
GetFileSize
ReadFile
GetModuleHandleA
DuplicateHandle
GetLastError
SetLastError
OpenProcess
TerminateProcess
WaitForSingleObject
CreateToolhelp32Snapshot
Process32First
Process32Next
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
lstrlenA
WriteFile
CloseHandle
CreateProcessA
FindFirstFileA
DeleteFileA
RemoveDirectoryA
FindNextFileA
FindClose
GetModuleFileNameA
GetEnvironmentVariableA
lstrcpyA
lstrcatA
GetCurrentProcess
GetCurrentThread
MultiByteToWideChar
GetFileAttributesA
VirtualAlloc
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
MapDialogRect
SetWindowPos
SetWindowContextHelpId
CopyRect
GetDC
ReleaseDC
MessageBeep
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
wsprintfA
SendMessageA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
GetDesktopWindow
CharUpperA
EnableWindow
IsIconic
GetClientRect
DrawIcon
LoadIconA
GetClassNameA
GetWindowLongA
PostThreadMessageA
RegisterClipboardFormatA
InvalidateRect
GetWindowRect
GetParent
GetWindow
GetSystemMetrics
IsDialogMessageA
GetMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
DefDlgProcA
IsWindowUnicode
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
CharNextA
InflateRect
GetSysColorBrush
PtInRect
LoadCursorA
LoadStringA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ShowWindow
MoveWindow
SetWindowTextA
SetDlgItemTextA
GetKeyState
DestroyMenu
EndDialog
ClientToScreen
IntersectClipRect
DeleteObject
ScaleWindowExtEx
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetMapMode
DPtoLP
GetTextColor
GetBkColor
LPtoDP
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
PatBlt
GetDeviceCaps
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateBitmap
GetFileTitleA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
RegOpenKeyA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ord17
ord8
CreateILockBytesOnHGlobal
CoTaskMemAlloc
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
StgCreateDocfileOnILockBytes
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoTaskMemFree
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
ord253
VariantTimeToSystemTime
SysAllocStringLen
SysFreeString
VariantCopy
VariantChangeType
SysAllocString
SysAllocStringByteLen
SysStringLen
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ