Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
399a8c4569838f1fd713f851824f26f7_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
399a8c4569838f1fd713f851824f26f7_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
399a8c4569838f1fd713f851824f26f7_JaffaCakes118
Size
523KB
MD5
399a8c4569838f1fd713f851824f26f7
SHA1
11e823c831d970210d36724a1f03a1bee3a9ddb9
SHA256
bbe7606bb737c4a359e9754384473f01e93b533c0904dfbfe5f7c65c852b76bb
SHA512
b99811e3333398b9853ca20727ad24cc5ea5cd8a94c56a95408e2e60b12524a66bcbdd13510e1da49130256b212e678047838cf88381fb088cc3280b1cdb1594
SSDEEP
12288:FDCIAYnPGNFO9ZapChYyOX8SLkvnx6sHpFifH4G//:BAUGNM9Z1rSgvnQsHpFc5n
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
InitializeCriticalSection
CreateMutexW
FlushFileBuffers
SetFileTime
ResetEvent
CreateDirectoryW
GetFileSize
ExpandEnvironmentStringsW
CopyFileW
MoveFileExW
Sleep
GetLocaleInfoW
HeapAlloc
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
CloseHandle
CreateFileW
ReadFile
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
InterlockedDecrement
WideCharToMultiByte
SetFilePointer
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
GetModuleFileNameW
LoadLibraryExW
FindResourceW
lstrlenW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
LoadCursorW
CreateWindowExW
RegisterClassExW
SetTimer
DefWindowProcW
GetClassInfoExW
DestroyWindow
GetWindowLongW
CallWindowProcW
KillTimer
SetWindowLongW
CreateAcceleratorTableW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
UnregisterClassA
InvalidateRect
GetDesktopWindow
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
GetWindow
PostThreadMessageW
FindWindowW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CreateSolidBrush
GetStockObject
GetDeviceCaps
GetObjectW
CreateCompatibleDC
DeleteDC
DeleteObject
SelectObject
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
SHGetFolderPathW
Shell_NotifyIconW
CoCreateInstance
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
SysStringLen
VariantCopy
SysAllocString
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
VariantInit
VariantClear
VariantChangeType
VarUI4FromStr
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ