Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
0944ad2b71e1ce09d6a9ed4fa1e4f97d_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0944ad2b71e1ce09d6a9ed4fa1e4f97d_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
0944ad2b71e1ce09d6a9ed4fa1e4f97d_JaffaCakes118
Size
514KB
MD5
0944ad2b71e1ce09d6a9ed4fa1e4f97d
SHA1
ec351343628fa7b169919b7201cab181c6d86b51
SHA256
93adee7e8c339f5a6c5fa9ed459527a83cde6c382cb459cf82445dab872f5d23
SHA512
b7a25e9b2b73e49ab5b8df239041b67049c48e2f065851f1a5ba3b92468fc69de5057734d6cf14b670c2643b59214a1ccc4c7ef045be19041b7608df9cc37de3
SSDEEP
12288:H1PO1Bt3enlibPTDVPoBS7n3IvDLpgq3jpfdY:OtsiVoB+sLpgIj/Y
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
CreateMutexW
CloseHandle
SetFilePointer
SetFilePointerEx
FlushFileBuffers
CreateDirectoryW
GetFileSize
GetTickCount
ReleaseMutex
LocalFileTimeToFileTime
CreateThread
GetLocaleInfoW
WideCharToMultiByte
lstrcpynW
GetFileInformationByHandle
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
RtlUnwind
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetConsoleCP
GetConsoleMode
LCMapStringW
SetStdHandle
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
GetLastError
SetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
lstrlenW
CreateFileW
ReadFile
WriteConsoleW
GetDlgItem
IsChild
EndPaint
FillRect
BeginPaint
RegisterWindowMessageW
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
InvalidateRect
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
GetWindow
PostThreadMessageW
IsWindow
GetDesktopWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CallWindowProcW
GetWindowLongW
DefWindowProcW
CreateWindowExW
DestroyWindow
LoadCursorW
GetClassInfoExW
RegisterClassExW
SetTimer
KillTimer
SetWindowLongW
SetFocus
UnregisterClassA
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
CreateSolidBrush
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoGetInterfaceAndReleaseStream
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
SysStringLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysAllocString
VariantCopy
VarUI4FromStr
SysStringByteLen
PathFileExistsW
PathAddBackslashW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ