Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2e47995ebf192a2434848cf0faf99091_JaffaCakes118.exe
Resource
win7-20240419-en
Target
2e47995ebf192a2434848cf0faf99091_JaffaCakes118
Size
870KB
MD5
2e47995ebf192a2434848cf0faf99091
SHA1
61ca2e4b868e3983bc328b7a0a9e59449eacb79c
SHA256
43e059078a56ffa0581fdda9a2a3d85cce77f28c57513b4f8ef3239ce7bd7d59
SHA512
9c694d4c779c8a2f6cba89627805bfbafeb12001147cdc3bb21465d99470823056a5d6f2ac81370428debb6f689d4b332744df9f19a7885d6770777354b8eafb
SSDEEP
12288:qaHrh6HC/wJkmGdRnSCcsJW+VGmLXbMpa6q9H5L3wcjRm/WDCc1buLbemN:qE6HCHjZcsorALZ1lAcF1Cc1buLbN
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
debug.pdb
DeleteObject
EnumObjects
SelectObject
CreateBitmap
CreateFontIndirectA
CreateFontA
CloseFigure
Chord
StrokePath
Polygon
GetVersion
OutputDebugStringA
lstrcpynA
ExitProcess
GetModuleFileNameA
FreeLibrary
DeleteFileA
MapViewOfFile
CloseHandle
SetEnvironmentVariableA
DuplicateHandle
GetCurrentProcess
GetCurrentProcessId
CreateFileMappingA
GetEnvironmentVariableA
GetExitCodeProcess
WaitForSingleObject
TerminateProcess
ResumeThread
CreateProcessA
GetCommandLineA
GetLastError
LoadLibraryA
lstrcmpiA
CreateFileA
FlushFileBuffers
WriteFile
SetCurrentDirectoryA
CreateDirectoryA
GetFileAttributesA
ExpandEnvironmentStringsA
GetCurrentDirectoryA
GetModuleHandleA
ReadConsoleA
WriteConsoleA
GetStdHandle
GetFullPathNameA
SetErrorMode
CreateTimerQueue
BindIoCompletionCallback
Sleep
HeapSize
FreeEnvironmentStringsA
TlsFree
GetProcessId
TryEnterCriticalSection
SuspendThread
SetPriorityClass
GetProcessHandleCount
GetProcAddress
MultiByteToWideChar
GetVersionExA
ReleaseMutex
GetFileSize
CreateMutexA
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
RtlUnwind
FormatMessageA
LocalFree
GetSystemTimeAsFileTime
ShowWindow
EndPaint
BeginPaint
DrawTextA
RegisterClassA
PostMessageA
TranslateMessage
GetDC
AttachThreadInput
CreateWindowExA
SendMessageW
GetMessageA
GetWindowLongA
DispatchMessageA
DrawTextW
SendMessageA
GetSaveFileNameA
CommDlgExtendedError
GetOpenFileNameA
CoTaskMemFree
CoCreateInstance
CoInitializeEx
OleInitialize
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDiskFreeSpaceExA
ord174
ShellExecuteExA
SHFileOperationA
rand
memset
srand
_pgmptr
__argc
__argv
__CxxFrameHandler
free
memmove
_ismbblead
__getmainargs
_cexit
_exit
realloc
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp
malloc
_time64
atoi
_snprintf
_XcptFilter
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ