Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
03a6a9a890c459b3f7e27f9c826e6a9a_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
03a6a9a890c459b3f7e27f9c826e6a9a_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
03a6a9a890c459b3f7e27f9c826e6a9a_JaffaCakes118
Size
544KB
MD5
03a6a9a890c459b3f7e27f9c826e6a9a
SHA1
feda949afd202f4bea5521c49b5d6b2a57a9c322
SHA256
51adf2cde2aec3cd603465fb201efe2953189dff82ee017bbc702c32040c8f84
SHA512
c6db71921582a61a852c71e59ed185725d4f00f35ae9cc3fea5de1a3033b57d2aa0605ab139f17ae911527350a9b82b0360e333a306b912f439848f3df1e90cf
SSDEEP
12288:2GR1CBJhfcaIyQ8Pd7ctsXjLKswSt2YEkQBLxpK:EBoaIz8PdnXfKN3lxA
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
CreateMutexW
WriteFile
SetFilePointer
GetVersionExW
CreateDirectoryW
GetCommandLineW
GetTempFileNameW
GetTickCount
ReleaseMutex
LocalFileTimeToFileTime
CreateFileMappingW
GetLocaleInfoW
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
FlushFileBuffers
CloseHandle
CreateFileW
ReadFile
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
InterlockedIncrement
WideCharToMultiByte
RtlUnwind
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedDecrement
lstrlenW
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
InterlockedPushEntrySList
InterlockedCompareExchange
GetWindowLongW
DefWindowProcW
CreateWindowExW
DestroyWindow
LoadCursorW
GetClassInfoExW
RegisterClassExW
SetTimer
KillTimer
SetWindowLongW
InvalidateRect
CallWindowProcW
CharNextW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
UnregisterClassA
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
MsgWaitForMultipleObjects
UpdateLayeredWindow
SendMessageW
GetDesktopWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CreateSolidBrush
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
GetOpenFileNameW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
CoCreateInstance
CoTaskMemFree
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoMarshalInterThreadInterfaceInStream
StringFromCLSID
CLSIDFromProgID
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
SysAllocString
SysStringLen
VariantCopy
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
VariantInit
VariantClear
VariantChangeType
VarUI4FromStr
PathFileExistsW
PathIsDirectoryW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ