Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
406f995dd8c0b61b41f7528a55036c6a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
406f995dd8c0b61b41f7528a55036c6a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
406f995dd8c0b61b41f7528a55036c6a_JaffaCakes118
Size
513KB
MD5
406f995dd8c0b61b41f7528a55036c6a
SHA1
984ab4526bbe7e30faf76a61800e64ad27af35c7
SHA256
07644daf98745af7573b5b7fb7a7f3cd853d09a3396795d0ca7e606a11d66fa7
SHA512
33f6cbff9bbf8b09bd0700763cee21999fb107d809d669dcf8f4c90abbe4b23c87bd34c68de96c09b34b51d16d0e8dc42f273b8e8444b2df83546e659275c459
SSDEEP
12288:GKpfGK+ky0BX/mAEb4n005cSYMFjp13tm0WnM52Z914u7ewL:Gy+CX/mAEbA92SYMFdZtm0WnM5w9x7e4
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
DeleteFileW
CreateFileW
SetFilePointer
SetFilePointerEx
GetTempPathW
ReadFile
RemoveDirectoryW
GetCurrentProcessId
MoveFileExW
GetLocaleInfoW
GlobalAlloc
GetProcessHeap
lstrcmpW
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
GlobalUnlock
GlobalLock
FlushFileBuffers
CloseHandle
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
GetConsoleCP
InterlockedDecrement
RtlUnwind
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
HeapFree
GetModuleFileNameW
LoadLibraryExW
FindResourceW
lstrlenW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
InterlockedPushEntrySList
InterlockedCompareExchange
DefWindowProcW
CreateWindowExW
DestroyWindow
GetWindowLongW
GetClassInfoExW
RegisterClassExW
SetTimer
KillTimer
CallWindowProcW
CharNextW
LoadCursorW
SetWindowLongW
DispatchMessageW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
InvalidateRect
GetDesktopWindow
GetFocus
UpdateWindow
GetWindowTextW
GetWindowTextLengthW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
MsgWaitForMultipleObjects
GetParent
SendMessageW
SetWindowTextW
PeekMessageW
GetMessageW
TranslateMessage
UnregisterClassA
CreateSolidBrush
GetStockObject
GetDeviceCaps
GetObjectW
CreateCompatibleDC
DeleteDC
DeleteObject
SelectObject
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
Shell_NotifyIconW
DoEnvironmentSubstW
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CLSIDFromString
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
VariantChangeType
VariantInit
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringLen
VariantCopy
SysAllocString
SysFreeString
VariantClear
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ