Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8f9c3ccd917b1c231e3df0c23c9068f5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8f9c3ccd917b1c231e3df0c23c9068f5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
8f9c3ccd917b1c231e3df0c23c9068f5_JaffaCakes118
Size
546KB
MD5
8f9c3ccd917b1c231e3df0c23c9068f5
SHA1
af6d7047a9bebb290022b89457641bf2a4ebf2ce
SHA256
711ae361814be3b0e4affd6ea523a09a5917ffe83ed43ff4ec7ef8c6f6835512
SHA512
a432cac45ecfeb1b90af6c4efe3c1114cd9a5bb40787c1437edc48602a3a7134fb0c58dea0304bd11d64695d951f06ca2fb5473f43ebdbab4312b4dd1bd56e01
SSDEEP
12288:f4fmuV/2SlI1MCAHab5I0WozQsmknY87Z1EPclMkc9A7Z2W:f42DMCA6b5fWQmknY87LEPcl9nlf
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
CreateEventW
WaitForSingleObject
SetFilePointer
SetFilePointerEx
SetEndOfFile
GetFileSize
ReadFile
GetFileAttributesExW
GetCurrentProcessId
GetTempFileNameW
GetTickCount
GetSystemTimeAsFileTime
MapViewOfFile
HeapFree
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
FlushFileBuffers
CloseHandle
CreateFileW
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
GetConsoleCP
DeleteCriticalSection
RtlUnwind
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
InterlockedPushEntrySList
InterlockedCompareExchange
DestroyWindow
LoadCursorW
CreateWindowExW
RegisterClassExW
SetTimer
KillTimer
DefWindowProcW
GetWindowLongW
GetClassInfoExW
SetWindowLongW
CallWindowProcW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
InvalidateRect
GetDesktopWindow
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
SendMessageW
LoadImageW
LoadIconW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
UnregisterClassA
CreateSolidBrush
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
DeleteDC
DeleteObject
CreateCompatibleDC
GetSaveFileNameW
GetOpenFileNameW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
Shell_NotifyIconW
CommandLineToArgvW
DoEnvironmentSubstW
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
SysAllocString
VariantChangeType
VariantClear
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringLen
SysFreeString
VariantInit
VariantCopy
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ