Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2fcbf13c5d66e2b9d0ec443f73287c87_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2fcbf13c5d66e2b9d0ec443f73287c87_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
2fcbf13c5d66e2b9d0ec443f73287c87_JaffaCakes118
Size
531KB
MD5
2fcbf13c5d66e2b9d0ec443f73287c87
SHA1
29d6ed784ba1412e6fea887d476c0d18090d7872
SHA256
54e1d62c7c18b2432b926ed872d1e421e6c5abade16cb3a9bc51479a196c8e21
SHA512
cb4b4188ed8baaac2b27cb0e010f15cdadbf63e2a3d3c7792d7a31aa8a58b7b79040cb22567bd935b6b9ac997726d5b8a23ce848ba2815b9bccd35012c58d6b2
SSDEEP
12288:k6HNSrvkun2QG5W5HQ0us+q3d7lA2fbCb:irPG4HQ0usJ3d7f2b
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
CreateMutexW
ResetEvent
ReadFile
RemoveDirectoryW
GetCommandLineW
GetCurrentDirectoryW
MapViewOfFile
UnmapViewOfFile
Sleep
GetProcessHeap
lstrcmpW
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
FlushFileBuffers
CloseHandle
CreateFileW
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
GetModuleFileNameW
WideCharToMultiByte
SetFilePointer
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
LoadLibraryExW
FindResourceW
lstrlenW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
IsProcessorFeaturePresent
HeapAlloc
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
KillTimer
SetTimer
LoadCursorW
RegisterClassExW
GetClassInfoExW
DestroyWindow
CreateWindowExW
DefWindowProcW
SetWindowLongW
InvalidateRect
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
UnregisterClassA
GetDesktopWindow
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
UpdateLayeredWindow
GetParent
GetWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CallWindowProcW
GetWindowLongW
CreateSolidBrush
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
DeleteDC
DeleteObject
CreateCompatibleDC
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
SHGetFolderPathW
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoInitialize
CoTaskMemAlloc
LoadRegTypeLi
LoadTypeLi
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysAllocString
VariantCopy
SysStringLen
VarUI4FromStr
SysAllocStringByteLen
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ