Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8c584146b9d04c590f20352d229df6cb_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8c584146b9d04c590f20352d229df6cb_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
8c584146b9d04c590f20352d229df6cb_JaffaCakes118
Size
11.7MB
MD5
8c584146b9d04c590f20352d229df6cb
SHA1
7d5dd2b6f94d133de9b4b82eb7b01c654df05800
SHA256
77f257c3bc1ccfce249eb1741183cfc1c699043610b3da706ea3b2efd0bea386
SHA512
21b33eae9cc6f6a78a8cd1b11515917d0ff6ff149eecdfc03c3fa4fa867681562c2e289547dda3c6049ab5e71b2bc997c501f6aad1afa77b3b5228b5325fbf0f
SSDEEP
196608:jABjTr805KndM0CIVRKx+83kW8+e6s6U08lr8ZvKgRTJIb0LLdnO5z2OowJtMV:UBvQBdMnInGZv8NBJAZv3JIQLk7owQV
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\BranchAI\win\Release\stubs\x86u\ExternalUi.pdb
GetLastError
GetDriveTypeW
CompareStringW
lstrcmpiW
lstrlenW
FreeLibrary
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
HeapCreate
ExitProcess
GetModuleFileNameA
TlsFree
TlsSetValue
TlsAlloc
LoadLibraryW
LCMapStringW
LCMapStringA
DeleteCriticalSection
GetStringTypeW
RtlUnwind
GetSystemTimeAsFileTime
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
LoadLibraryA
LocalAlloc
PeekNamedPipe
GetStdHandle
TerminateProcess
OpenProcess
SearchPathW
ConnectNamedPipe
CreateNamedPipeW
GetVersion
GetExitCodeProcess
CreateProcessW
GetDiskFreeSpaceExW
ResetEvent
MoveFileW
TerminateThread
GetSystemTime
GetEnvironmentVariableW
GetWindowsDirectoryW
GetSystemDirectoryW
InitializeCriticalSection
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpW
CreateFileW
WriteFile
CreateMutexW
GetFileSize
ReadFile
GlobalFree
GetTempPathW
FindFirstFileW
DeleteFileW
InterlockedExchange
WideCharToMultiByte
GetModuleHandleW
LoadLibraryExW
MultiByteToWideChar
FindClose
CreateFileA
GetFileAttributesW
GetLogicalDriveStringsW
FindNextFileW
RemoveDirectoryW
GetCPInfo
GetProcAddress
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
CreateDirectoryW
GetCurrentProcessId
CloseHandle
GetExitCodeThread
OutputDebugStringW
GlobalMemoryStatus
GetUserDefaultLangID
SetEvent
GetSystemDefaultLangID
GetLocaleInfoW
EnumResourceLanguagesW
SetFilePointer
CopyFileW
SetCurrentDirectoryW
FlushFileBuffers
LocalFree
FormatMessageW
SetFileAttributesW
GetShortPathNameW
GetTempFileNameW
GetCurrentThread
CreateThread
GetVersionExW
WaitForSingleObject
CreateEventW
SetLastError
FlushInstructionCache
GetCurrentProcess
Sleep
RaiseException
EnterCriticalSection
GetCurrentThreadId
LeaveCriticalSection
TlsGetValue
MulDiv
SetFocus
GetDC
ReleaseDC
GetWindowRect
SendMessageW
GetSysColorBrush
IsWindowVisible
IntersectRect
EqualRect
MapWindowPoints
GetWindowLongW
PtInRect
IsRectEmpty
SetRectEmpty
GetClientRect
ClientToScreen
SetWindowPos
OffsetRect
GetSystemMetrics
GetWindowTextW
GetWindowTextLengthW
DrawIconEx
GetComboBoxInfo
DrawFrameControl
RegisterWindowMessageW
CreateAcceleratorTableW
InvalidateRgn
GetDesktopWindow
DestroyAcceleratorTable
GetKeyState
DrawTextExW
DrawStateW
ValidateRect
DestroyMenu
AppendMenuW
CreatePopupMenu
TrackPopupMenu
InflateRect
LoadBitmapW
CharNextW
DrawFocusRect
GetClassNameW
ReleaseCapture
GetCapture
SetCapture
UpdateWindow
GetDlgCtrlID
SetScrollInfo
GetScrollPos
GetClassInfoExW
RegisterClassExW
SetScrollPos
EndPaint
FillRect
SetRect
BeginPaint
MoveWindow
GetScrollInfo
ScreenToClient
GetMessagePos
GetSysColor
RedrawWindow
DestroyIcon
SystemParametersInfoW
GetActiveWindow
TrackMouseEvent
GetAsyncKeyState
GetWindowDC
KillTimer
CreateWindowExW
DestroyCursor
GetWindowRgn
DrawTextW
IsZoomed
SetWindowRgn
CreateDialogParamW
EndDialog
DialogBoxParamW
GetNextDlgTabItem
CopyRect
IsWindowEnabled
SetCursor
GetWindow
MonitorFromWindow
GetMonitorInfoW
LoadImageW
InvalidateRect
IsDialogMessageW
IsChild
GetFocus
PostQuitMessage
IsWindow
LoadStringW
MessageBoxW
PostMessageW
SetForegroundWindow
SetCursorPos
GetCursorPos
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
ShowWindow
LoadCursorW
GetParent
GetPropW
GetForegroundWindow
MsgWaitForMultipleObjects
GetSystemMenu
ModifyMenuW
FindWindowW
ExitWindowsEx
SetPropW
RemovePropW
EnableMenuItem
LoadMenuW
GetSubMenu
SetTimer
LoadIconW
OpenClipboard
CloseClipboard
EmptyClipboard
SetClipboardData
UnregisterClassA
CallWindowProcW
SetWindowLongW
GetDlgItem
SetWindowTextW
DestroyWindow
EnableWindow
DefWindowProcW
GetTextMetricsW
ExtTextOutW
SetBkColor
GetWindowExtEx
GetViewportExtEx
SetMapMode
GetMapMode
CreateDIBSection
CreateFontIndirectW
GetObjectW
CreateSolidBrush
GetRgnBox
EqualRgn
CreatePolygonRgn
CreateRectRgnIndirect
GetStockObject
GetBitmapBits
ExcludeClipRect
SelectClipRgn
CreateRectRgn
SetBkMode
SetTextColor
SetViewportOrgEx
GetDeviceCaps
SetBrushOrgEx
CreatePatternBrush
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
CreateBitmapIndirect
CreateFontW
LookupPrivilegeValueW
OpenProcessToken
StartServiceW
QueryServiceStatus
OpenServiceW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
AdjustTokenPrivileges
OpenSCManagerW
LockServiceDatabase
UnlockServiceDatabase
CloseServiceHandle
GetUserNameW
RegOpenKeyW
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetFileInfoW
ShellExecuteW
CoGetClassObject
CoCreateInstance
CLSIDFromString
OleInitialize
CoUninitialize
CoInitializeEx
CoTaskMemFree
CreateStreamOnHGlobal
OleLockRunning
StringFromGUID2
CoTaskMemAlloc
OleUninitialize
CoInitialize
CoTaskMemRealloc
CLSIDFromProgID
SysStringByteLen
OleLoadPicture
VarDateFromStr
VarUI4FromStr
LoadRegTypeLi
SysAllocStringByteLen
OleCreateFontIndirect
VariantChangeType
VariantCopy
VariantInit
VariantClear
SysAllocString
SysFreeString
SysAllocStringLen
SysStringLen
LoadTypeLi
SymSetOptions
SymInitialize
StackWalk
SymCleanup
SymGetLineFromAddr
SymGetSymFromAddr
SymFunctionTableAccess
SymGetModuleBase
PathIsUNCW
PathFileExistsW
ImageList_ReplaceIcon
ImageList_AddMasked
ImageList_GetIcon
ImageList_SetBkColor
ImageList_LoadImageW
InitCommonControlsEx
DestroyPropertySheetPage
PropertySheetW
CreatePropertySheetPageW
ImageList_Create
_TrackMouseEvent
ImageList_Destroy
TransparentBlt
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetOpenFileNameW
GetSaveFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ