Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8054e2d631589b1a217dc7e4f1dbc588_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8054e2d631589b1a217dc7e4f1dbc588_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
8054e2d631589b1a217dc7e4f1dbc588_JaffaCakes118
Size
559KB
MD5
8054e2d631589b1a217dc7e4f1dbc588
SHA1
ff22bb60901198d5ed67cc3fbb2d215edce2dab2
SHA256
5cdd794576d63f1e6d4a0b4f1dd3bda2aff1a7d25c2000eb603eb4b4e9b34382
SHA512
7729ec9ca57e4d13f3c9f9733d2fc48ac1bf4da83471c143c7c5ff51b4e7096f539e3e0737483aa298704e970b7c665faf8e6f277171ae5a96a18d556e91e806
SSDEEP
12288:Z8WGC0twNEP9UsWf/N1YcseReA6k/9F3C:Z6wK9pWf//zseRB6k+
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
CloseHandle
ResetEvent
GetSystemTime
ReleaseMutex
MoveFileExW
SetCurrentDirectoryW
CreateFileMappingW
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
FlushFileBuffers
CreateFileW
ReadFile
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
SetFilePointer
InterlockedDecrement
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
lstrlenW
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetFocus
SetWindowLongW
KillTimer
SetTimer
RegisterClassExW
GetClassInfoExW
LoadCursorW
DestroyWindow
CreateWindowExW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
InvalidateRect
GetDesktopWindow
UnregisterClassA
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
MessageBoxW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CallWindowProcW
GetWindowLongW
DefWindowProcW
CreateSolidBrush
GetStockObject
GetObjectW
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
GetDeviceCaps
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
OleUninitialize
OleLockRunning
CreateStreamOnHGlobal
OleInitialize
LoadTypeLi
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysAllocString
VariantCopy
SysStringLen
VarUI4FromStr
LoadRegTypeLi
OleCreateFontIndirect
SysAllocStringByteLen
SysStringByteLen
VarBstrCat
DispCallFunc
PathAddBackslashW
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ