Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
7fe6ee98f30605da8fd301777a0a3cb8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7fe6ee98f30605da8fd301777a0a3cb8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
7fe6ee98f30605da8fd301777a0a3cb8_JaffaCakes118
Size
553KB
MD5
7fe6ee98f30605da8fd301777a0a3cb8
SHA1
2965d25a7b834cf4f96f3afa643113f28c09b986
SHA256
5288d1c1eebc089cf1ce96d540115e374103cf5ad566ba21229d010a7f700033
SHA512
b58e96001b191bd1611f3863e436b14ef0d781f0c11a88a06a56fe3537abda7053ba6bf81395d51683f23069b5424df2b3b59de29e12cdff959d4a96a1661e89
SSDEEP
12288:UZvFB2w5lm95Pp+KR44qJUgA4/cE+qGpksprJ:yd5KL44A3LBEksprJ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
WaitForSingleObject
SetEvent
SetFilePointer
SetFileTime
GetFileSize
ReadFile
MoveFileExW
LocalFileTimeToFileTime
CreateThread
GetExitCodeProcess
WideCharToMultiByte
lstrcpynW
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
FlushFileBuffers
CloseHandle
CreateFileW
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
GetConsoleCP
InterlockedDecrement
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
lstrlenW
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
LoadCursorW
CreateWindowExW
RegisterClassExW
SetTimer
DefWindowProcW
GetWindowLongW
GetClassInfoExW
DestroyWindow
CallWindowProcW
CharNextW
KillTimer
SetWindowLongW
CreateAcceleratorTableW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
UnregisterClassA
InvalidateRect
GetFocus
UpdateWindow
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
GetWindow
SetWindowTextW
LoadIconW
PostThreadMessageW
MessageBoxW
GetDesktopWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CreateSolidBrush
GetStockObject
GetDeviceCaps
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
GetObjectW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
Shell_NotifyIconW
SHGetFolderPathW
CoCreateInstance
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoMarshalInterThreadInterfaceInStream
StringFromCLSID
CLSIDFromString
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
SysStringLen
SysAllocString
VariantChangeType
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysFreeString
VariantInit
VariantClear
VariantCopy
PathAddBackslashW
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ