Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
4ec38f27210783a33073d4ebc57c5ce9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ec38f27210783a33073d4ebc57c5ce9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
4ec38f27210783a33073d4ebc57c5ce9_JaffaCakes118
Size
96KB
MD5
4ec38f27210783a33073d4ebc57c5ce9
SHA1
8fd4b5ba70703539892cf6a23fab06281c92458a
SHA256
3c29313a67044658763f7c1fab976f9988c160ff665f52b103a6e9c1259352c9
SHA512
5e20036be99995c1dbd90659a6a67a4a1439a119544cc5c605e5b8ed0f6a3161f552f209b15b084294ef10bcdeef0b1e9ceb3654baf105270f9b281458cefe8d
SSDEEP
1536:t8RNvRmrL7krH5h3gLEOuDVZWBiw98h69fKFSTH4XH1IuPv:4Nm7e5yLqD+uA9KFSTH4lIu3
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
memset
strstr
memmove
strncmp
strncpy
strlen
strcpy
strcat
atoi
sprintf
_strnicmp
strcmp
memcpy
_stricmp
tolower
_snprintf
localtime
mktime
gmtime
fabs
ceil
malloc
floor
free
fclose
GetModuleHandleA
HeapCreate
GetCurrentProcessId
GetConsoleWindow
MoveFileExA
HeapDestroy
ExitProcess
CreateToolhelp32Snapshot
Process32First
Module32First
OpenProcess
CloseHandle
Process32Next
ExpandEnvironmentStringsA
GetCurrentProcess
GetLastError
GetModuleFileNameA
InitializeCriticalSection
GetCommandLineA
DuplicateHandle
CreatePipe
GetStdHandle
HeapAlloc
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
HeapFree
FreeLibrary
LoadLibraryA
GetProcAddress
Sleep
GetVersionExA
SetLastError
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
CreateDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
FindNextFileA
MoveFileA
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
WriteFile
CreateFileA
SetFilePointer
ReadFile
GetFileSize
MultiByteToWideChar
GetLocalTime
AllocConsole
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
SetConsoleTitleA
SetConsoleTextAttribute
FlushFileBuffers
WriteConsoleA
HeapReAlloc
TlsAlloc
WideCharToMultiByte
DeleteCriticalSection
ShowWindow
SendMessageA
UpdateWindow
CharLowerA
CharUpperA
DestroyWindow
GetWindowTextLengthA
SetWindowTextA
GetWindowTextA
SetScrollPos
GetPropA
SetPropA
GetParent
GetDC
InflateRect
ReleaseDC
GetWindowDC
GetWindowRect
IsWindowEnabled
CallWindowProcA
RemovePropA
GetWindowLongA
CreateWindowExA
SetWindowLongA
SetWindowPos
RedrawWindow
MapWindowPoints
MoveWindow
InvalidateRect
DefWindowProcA
GetWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
RegisterClassA
AdjustWindowRectEx
CreateAcceleratorTableA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
GetActiveWindow
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
GetClientRect
GetMenu
GetSystemMetrics
SetFocus
GetFocus
FillRect
EnumChildWindows
PostMessageA
DefFrameProcA
IsWindowVisible
IsChild
GetClassNameA
GetKeyState
GetWindowThreadProcessId
RegisterWindowMessageA
DestroyIcon
GetStockObject
ExcludeClipRect
DeleteObject
GetObjectType
GetObjectA
CreateCompatibleDC
GetDIBits
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateBitmap
SetPixel
RegOpenKeyExA
RegConnectRegistryA
RegEnumValueA
RegQueryValueExA
RegCloseKey
LookupAccountNameA
SetNamedSecurityInfoA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
CloseServiceHandle
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCreateKeyA
GetUserNameA
InitCommonControlsEx
IsUserAnAdmin
ShellExecuteExA
closesocket
WSACleanup
WSAStartup
connect
socket
inet_addr
gethostbyname
htons
bind
ioctlsocket
select
__WSAFDIsSet
send
sendto
recvfrom
recv
RevokeDragDrop
timeBeginPeriod
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ