Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
1027ede32fbc03b88d4b2949769c0f6a_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1027ede32fbc03b88d4b2949769c0f6a_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
1027ede32fbc03b88d4b2949769c0f6a_JaffaCakes118
Size
529KB
MD5
1027ede32fbc03b88d4b2949769c0f6a
SHA1
44b656465ab5a6ae828379b6b6dd87defaf194f9
SHA256
a7e0a83a8dd4ae6bc24b5637935afd027d4fe39fd8d416375b645457e9ed253b
SHA512
e62f3f405d4757b05f0f3a5fd59501df125ff097241369ff2a2099563915620bdbcf231c0f1a5b93dc8868fc052c1df7fba1dd4dfc7ceff2685d19eae89bc56a
SSDEEP
6144:XEu/EmtPkE8w3M/gK9zyyQ6oGmPEZ7Lbvby9kB3zrrFknqJ0Oc0mCpq3rAK3ksPd:XbiW3UT9muTblB3zrrFkOOCM7n/GVzuH
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
CreateMutexW
SetFilePointer
SetFileTime
GetFileSize
ReadFile
GetTempFileNameW
SystemTimeToFileTime
CreateThread
GlobalFree
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
FlushFileBuffers
CloseHandle
CreateFileW
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
DeleteCriticalSection
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
lstrlenW
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
RegisterClassExW
LoadCursorW
KillTimer
DefWindowProcW
DestroyWindow
CreateWindowExW
SetTimer
GetClassInfoExW
GetWindowLongW
CallWindowProcW
CharNextW
SetWindowLongW
CreateAcceleratorTableW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
UnregisterClassA
InvalidateRect
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
GetParent
SendMessageW
LoadImageW
SendMessageTimeoutW
FindWindowW
GetDesktopWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CreateSolidBrush
GetDeviceCaps
GetObjectW
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
GetStockObject
GetOpenFileNameW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
CommandLineToArgvW
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoMarshalInterThreadInterfaceInStream
StringFromCLSID
CoTaskMemAlloc
VarUI4FromStr
VariantCopy
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysAllocString
SysStringLen
PathAddBackslashW
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ