Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
37973d181e8c07a6feb6e9295082b277_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
37973d181e8c07a6feb6e9295082b277_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
37973d181e8c07a6feb6e9295082b277_JaffaCakes118
Size
502KB
MD5
37973d181e8c07a6feb6e9295082b277
SHA1
0acf1b7e76a83aa136e1cfcf8b08b5e11b0b4162
SHA256
084cd20235a8b9e7f948f7ab3d6a7e5086f424bfb42a98b4254737d51cc39ec4
SHA512
3cbd96d5278f2f93198fa75888f5c7eaf97be4ffac085d2bed2edc89eba9fd48ae1779e8759f2a3be0b7002cccec47a0dd0e01f4b1e68cbbf35692d9be7309ed
SSDEEP
6144:n017vY/DQUreB72LI1XHJ48UVTvGTsTBRwIHosLGU+EHZCUaJ8HXFrM:nCw/DQUreZ2O+18sT3R9VZBaJ83FrM
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
DuplicateTokenEx
CreateProcessAsUserW
MessageBoxA
CharNextW
LoadStringW
SetClassLongW
SetWindowLongW
GetWindowLongW
CreateWindowExW
wvsprintfW
UpdateWindow
UnregisterClassW
TranslateMessage
TrackPopupMenuEx
TrackMouseEvent
SystemParametersInfoW
ShowWindow
SetWindowPos
SetTimer
SetParent
SetMenuItemInfoW
SetForegroundWindow
SendMessageTimeoutW
SendMessageW
ScreenToClient
RemoveMenu
ReleaseDC
RegisterWindowMessageW
RegisterClassExW
RegisterClassW
PtInRect
PostQuitMessage
PostMessageW
PeekMessageW
MessageBoxW
LoadStringW
LoadImageW
LoadIconW
LoadCursorW
LoadBitmapW
KillTimer
IsWindowVisible
IsWindowEnabled
IsIconic
InvalidateRect
InsertMenuItemW
GetWindowThreadProcessId
GetWindowRect
GetSystemMetrics
GetSysColor
GetParent
GetMessageW
GetForegroundWindow
GetDC
GetCursorPos
GetClientRect
GetClassInfoExW
GetClassInfoW
FillRect
EndPaint
EnableWindow
DrawTextW
DrawFrameControl
DispatchMessageW
DestroyWindow
DestroyMenu
DefWindowProcW
CreatePopupMenu
ClientToScreen
CharUpperBuffW
CharUpperW
CharLowerBuffW
CallWindowProcW
BringWindowToTop
BeginPaint
AttachThreadInput
GetMonitorInfoW
MonitorFromWindow
Sleep
VirtualFree
VirtualAlloc
lstrlenW
lstrcpynW
VirtualQuery
GetTickCount
GetSystemInfo
GetVersion
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
ExitThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
LocalFree
LocalAlloc
GetModuleHandleW
FreeLibrary
lstrcmpiW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
VirtualFree
VirtualAlloc
Sleep
SizeofResource
SetLastError
SetFileTime
SetFilePointer
SetEvent
SetErrorMode
ResumeThread
ResetEvent
ReadFile
OpenMutexW
LockResource
LocalFree
LocalFileTimeToFileTime
LoadResource
LoadLibraryW
LeaveCriticalSection
IsValidLocale
InitializeCriticalSection
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
GetVersionExW
GetUserDefaultLCID
GetTimeZoneInformation
GetTickCount
GetThreadLocale
GetTempPathW
GetStdHandle
GetLongPathNameW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileSize
GetFileAttributesW
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentProcess
GetCPInfo
FreeResource
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
FreeLibrary
FormatMessageW
FlushFileBuffers
FindResourceW
FindFirstFileW
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumSystemLocalesW
EnumCalendarInfoW
EnterCriticalSection
DosDateTimeToFileTime
DeleteFileW
DeleteCriticalSection
CreateThread
CreateProcessW
CreateMutexW
CreateFileW
CreateEventW
CompareStringW
CloseHandle
GetUserDefaultUILanguage
GetUserGeoID
AlphaBlend
SetWindowOrgEx
SetTextColor
SetBkMode
SetBkColor
SelectObject
MoveToEx
LineTo
GetTextExtentPoint32W
GetTextColor
GetStockObject
GetObjectW
GetCurrentObject
GetBkMode
GetBkColor
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateFontIndirectW
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
AddFontMemResourceEx
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
WNetGetProviderNameW
ShellExecuteW
SHGetSpecialFolderPathW
Shell_NotifyIconW
CoUninitialize
CoInitializeEx
CoInitialize
CoCreateGuid
CreateStreamOnHGlobal
InitCommonControlsEx
InitCommonControls
IsUserAdmin
InternetReadFile
InternetOpenUrlW
InternetOpenW
InternetCrackUrlW
InternetConnectW
InternetCloseHandle
InternetCanonicalizeUrlW
HttpSendRequestW
HttpQueryInfoW
HttpOpenRequestW
DeleteUrlCacheEntryW
UrlEscapeW
AssocQueryStringW
CryptCATAdminReleaseContext
CryptCATAdminReleaseCatalogContext
CryptCATCatalogInfoFromContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminAcquireContext
CryptCATAdminCalcHashFromFileHandle
WinVerifyTrustEx
WSACleanup
WSAStartup
WSAGetLastError
gethostbyname
socket
shutdown
setsockopt
send
recv
inet_addr
htons
connect
closesocket
CloseThemeData
DrawThemeBackground
GetThemePartSize
OpenThemeData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ