Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
6391d56435cd2baab41ad7bf0d6a53d1_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6391d56435cd2baab41ad7bf0d6a53d1_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
6391d56435cd2baab41ad7bf0d6a53d1_JaffaCakes118
Size
545KB
MD5
6391d56435cd2baab41ad7bf0d6a53d1
SHA1
863ef41bbaa80dc79dd47b2c23c2ca6acb60b66f
SHA256
a61864155c956c48ced68a31d6702b94a14f429f746317ccf40d2ed830b7c693
SHA512
f25ba54c538838c1eeebd0efa5763983fad2a369b2804d4405a7154cedebe1f8a8e87397fec17e41fc8662d6587731cf24e3ab558bda347e88dd9e5ce2e52259
SSDEEP
12288:ck/gjKuR/ehb+QEDD5Y4glnYedLJ/ofp3toIyNIa:sjh/ehED5CYedLJ/g3sNIa
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
DeleteFileW
CreateFileW
ResetEvent
GetVersionExW
ReadFile
GetFileAttributesExW
GetCurrentProcessId
GetTempFileNameW
GetCurrentDirectoryW
ResumeThread
GlobalFree
HeapAlloc
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
FlushFileBuffers
CloseHandle
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
DeleteCriticalSection
RtlUnwind
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
LoadLibraryExW
lstrlenW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
SetFilePointer
VirtualFree
IsProcessorFeaturePresent
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetClassInfoExW
RegisterClassExW
SetTimer
KillTimer
SetWindowLongW
CreateAcceleratorTableW
LoadCursorW
DestroyWindow
CreateWindowExW
DefWindowProcW
GetWindowLongW
CallWindowProcW
CharNextW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
UnregisterClassA
InvalidateRect
GetDesktopWindow
GetFocus
UpdateWindow
GetWindowTextW
GetWindowTextLengthW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
SendMessageW
SetWindowTextW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CreateSolidBrush
GetStockObject
GetDeviceCaps
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
GetObjectW
GetOpenFileNameW
RegEnumValueW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CLSIDFromProgID
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoGetInterfaceAndReleaseStream
StringFromCLSID
SysStringLen
SysAllocStringByteLen
LoadTypeLi
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysAllocString
VariantCopy
LoadRegTypeLi
VarUI4FromStr
SysStringByteLen
PathFileExistsW
PathIsDirectoryW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ