Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
fea63776874318aa938e846eb4786408_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fea63776874318aa938e846eb4786408_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
fea63776874318aa938e846eb4786408_JaffaCakes118
Size
136KB
MD5
fea63776874318aa938e846eb4786408
SHA1
064174415c75e221539ed6ad9a342bc8ca0c0c81
SHA256
22e76f25b9f10d05466da7d847549cae18c6065df6adfa672ea89ad2c1bf2dea
SHA512
328c65c255c18505e11bf8421ce77374950c2de072dec0ce20e685b73023df27c3f00de6ea0fad15b7ff9c03e34b5bade243ee52bc0ffd85df4aabc0493cbdf9
SSDEEP
3072:N0QgQbU99ahLXAtVcSTPswS0LXXbYRSvKxCXiRJMQ6o:OdQbU2hLE50HqX7Xivf
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
lstrlenA
LocalFree
GetModuleFileNameA
TlsSetValue
CreateThread
GetBinaryTypeA
GetVersionExA
TlsFree
TlsAlloc
CreateMutexA
TlsGetValue
lstrcpyA
OpenFileMappingA
MapViewOfFile
ReleaseMutex
UnmapViewOfFile
OpenMutexA
GetLastError
lstrcmpA
GetCurrentThreadId
lstrcatA
CreateProcessA
CloseHandle
lstrlenW
CreateFileMappingA
WaitForSingleObject
LocalAlloc
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
HeapReAlloc
IsBadWritePtr
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetStringTypeW
GetStringTypeA
SetConsoleCtrlHandler
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetUserDefaultLCID
EnumSystemLocalesA
InterlockedIncrement
GetCurrentProcessId
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
RtlUnwind
HeapFree
HeapAlloc
WideCharToMultiByte
GetCommandLineA
GetVersion
SetLastError
GetCurrentThread
GetModuleHandleA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetLocaleInfoA
GetStdHandle
GetFileType
IsBadCodePtr
EnterCriticalSection
LeaveCriticalSection
ExitProcess
FatalAppExitA
Sleep
GetCurrentProcess
SetHandleCount
IsBadReadPtr
UnhandledExceptionFilter
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
SetUnhandledExceptionFilter
FreeLibrary
GetDC
SendMessageTimeoutA
ReleaseDC
CopyIcon
GetWindowThreadProcessId
WaitForInputIdle
IsWindow
FindWindowExA
wsprintfA
DefWindowProcA
SetWindowLongA
GetWindowLongA
CreateWindowExA
RegisterClassExA
UnregisterClassA
DestroyWindow
GetClassNameA
EnumWindows
GetObjectA
GetDIBits
CreateDIBitmap
FreeSid
IsValidSid
IsValidSecurityDescriptor
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegSetValueExA
RegCreateKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
IsValidAcl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
GetSecurityDescriptorDacl
StringFromCLSID
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ