Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
5d6daf7e7ec5ac847532817a83d2b3aa_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5d6daf7e7ec5ac847532817a83d2b3aa_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
5d6daf7e7ec5ac847532817a83d2b3aa_JaffaCakes118
Size
536KB
MD5
5d6daf7e7ec5ac847532817a83d2b3aa
SHA1
b1f4f6c8cad2cc1d300522a25390da0f25ee2a2d
SHA256
873048c4418f48782c8c28ec234dedea7eaf504520dde65d73c59322a43984df
SHA512
6f3b35ad70fa5a35cf26d125114ee5a897ced95b6a40e8fb9bcfafe3f3e1ff88ccc481df21c5d454dcc4c646adbf462b0046661f6ad59322230bbefca371c8ec
SSDEEP
12288:70WTpwLAEtAtZUrh85hhzTu6V1FiMtw1dwfH4wS78nWOX:7n6EEgUrS5vRSMi1dwfH4rYnWI
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
WaitForMultipleObjects
SetEvent
CloseHandle
WriteFile
GetTempPathW
ReadFile
ReleaseMutex
LocalFileTimeToFileTime
CreateThread
ResumeThread
GlobalAlloc
GetFileInformationByHandle
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
FlushFileBuffers
CreateFileW
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
GetModuleFileNameW
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrlenW
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
SetFilePointer
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
RegisterClassExW
GetClassInfoExW
LoadCursorW
DestroyWindow
KillTimer
SetTimer
CreateWindowExW
DefWindowProcW
GetWindowLongW
CallWindowProcW
SetWindowLongW
CreateAcceleratorTableW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
UnregisterClassA
InvalidateRect
GetDesktopWindow
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
GetWindow
SendMessageTimeoutW
IsWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CreateSolidBrush
GetStockObject
GetObjectW
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
GetDeviceCaps
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
DoEnvironmentSubstW
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoUninitialize
LoadTypeLi
VarUI4FromStr
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysAllocString
VariantCopy
SysStringLen
LoadRegTypeLi
PathFileExistsW
PathRemoveFileSpecW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ