Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
71413f00199971630026de864c2b3364_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
71413f00199971630026de864c2b3364_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
71413f00199971630026de864c2b3364_JaffaCakes118
Size
550KB
MD5
71413f00199971630026de864c2b3364
SHA1
2557f4452e184a8ed2dcbcd5244663de4fe11300
SHA256
dcafbfaef8fa2f9b9138f12fca26cfc0805e10d43302e2ceb12d347102d70f3b
SHA512
0dc4427f584fe15de1f6849a7eb6885954a387e3b1b3f7d9febdbbf593e4e3c8e296e544da27e5425070e2543d155cb7ec5e9e3fa1e2f579c8194719b2bcbfa6
SSDEEP
12288:uz59WfZohUgXWUQfSX+2Dfkw+joO+nVynYeDe:Ho5XWUQCr+jo/MYwe
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
SetEvent
SetFilePointer
SetEndOfFile
GetVersionExW
GetFileSize
GetCommandLineW
GetSystemTime
ReleaseMutex
MoveFileExW
SetCurrentDirectoryW
VirtualQuery
Sleep
GetLocaleInfoW
HeapFree
lstrcpynW
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
RtlUnwind
GetCurrentProcessId
GetTickCount
GetModuleFileNameW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
InterlockedPushEntrySList
InterlockedCompareExchange
LCMapStringW
SetStdHandle
WriteConsoleW
ReadFile
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
GetLastError
SetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceCounter
lstrlenW
CreateFileW
CloseHandle
FlushFileBuffers
FillRect
BeginPaint
RegisterWindowMessageW
EndPaint
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
InvalidateRect
GetDesktopWindow
GetFocus
UpdateWindow
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
SetWindowTextW
LoadIconW
PostThreadMessageW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CallWindowProcW
GetWindowLongW
DefWindowProcW
CreateWindowExW
DestroyWindow
LoadCursorW
GetClassInfoExW
RegisterClassExW
SetTimer
KillTimer
SetWindowLongW
IsChild
UnregisterClassA
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
CreateSolidBrush
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
Shell_NotifyIconW
CommandLineToArgvW
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
SysAllocString
VarUI4FromStr
SysStringLen
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
SysFreeString
VariantInit
VariantClear
VariantChangeType
VariantCopy
LoadRegTypeLi
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ