Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
466b85c56a27ddbea00aac276811c696_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
466b85c56a27ddbea00aac276811c696_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
466b85c56a27ddbea00aac276811c696_JaffaCakes118
Size
224KB
MD5
466b85c56a27ddbea00aac276811c696
SHA1
6ee94c66b817aae1eba352cf16e36f0ada217a76
SHA256
b474fe0c3b21a31dcd054b10ed47750258165905aa99d25569db166bc9dd34a4
SHA512
bbe19be8183ca621e3efa894913ef1a5d357248eb64b01be84b2c6d154e668f9f5b82214965e54b99786ab6cf118003952e49df81cc2d694ccc127801312bb29
SSDEEP
3072:OhVxz+X9zTzyNH0QfzoNcM3r6ihGJaQIkl1Brhh1QJyRhOAg0FubA15BjMrDJ8i6:OhLqNyqQfzQzFGsQFiAOFrd8iJHs
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\projects\Git_repositories\IceDragon\IceDragon\obj-icedragon-official\dist\bin\restart_helper.pdb
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ShellExecuteW
CommandLineToArgvW
ShellExecuteExW
MessageBoxW
wsprintfW
GetModuleFileNameExW
EnumProcessModules
PathRemoveFileSpecW
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCurrentProcess
OutputDebugStringA
GetModuleFileNameW
WaitForSingleObject
GetFileAttributesW
OpenProcess
CreateToolhelp32Snapshot
CreateEventW
Sleep
GetLastError
Process32NextW
OutputDebugStringW
Process32FirstW
CloseHandle
LoadLibraryW
GetProcAddress
ReadProcessMemory
CreateProcessW
FreeLibrary
GetExitCodeProcess
MultiByteToWideChar
WideCharToMultiByte
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
WriteFile
GetACP
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
CreateFileW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ