Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8f3b274e48814637ed3540f8f624e83d_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8f3b274e48814637ed3540f8f624e83d_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
8f3b274e48814637ed3540f8f624e83d_JaffaCakes118
Size
550KB
MD5
8f3b274e48814637ed3540f8f624e83d
SHA1
7d41dd6de35bb9a93e911f173d9a3ebb4d1025f8
SHA256
effe3a3314a97465d940725491079639e6073987d2d6c9f8abd8e68b43a998ff
SHA512
9da010689ed6206daa7753ee7e39220fa393b1e353048dccde9932f893df32c3e4e284e61c4588ff45928344e73eb45271b6434c2e1d25958973d2fbdd6b5429
SSDEEP
12288:TjHBHWCsmMIuPyWYcYmojp9C0AkSzf4b/jHfaPhTzE4w7RIB/:fHBHxMdyW1YmojWx+HiPFzQG/
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
CreateEventW
CreateMutexW
SetEvent
FlushFileBuffers
SetFileTime
GetTempPathW
GetCommandLineW
GetSystemTime
CopyFileW
LocalFileTimeToFileTime
MapViewOfFile
GetExitCodeProcess
GetProcessHeap
HeapFree
lstrcpynW
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
CloseHandle
CreateFileW
ReadFile
WriteConsoleW
SetStdHandle
InterlockedIncrement
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
SetFilePointer
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
lstrlenW
InterlockedDecrement
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
LCMapStringW
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
InterlockedPushEntrySList
InterlockedCompareExchange
SetTimer
KillTimer
SetWindowLongW
GetDesktopWindow
RegisterClassExW
GetClassInfoExW
LoadCursorW
DestroyWindow
CreateWindowExW
DefWindowProcW
GetWindowLongW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
InvalidateRect
UnregisterClassA
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CallWindowProcW
CreateSolidBrush
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
GetSaveFileNameW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CLSIDFromString
CoGetInterfaceAndReleaseStream
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
SysStringLen
SysStringByteLen
OleCreateFontIndirect
DispCallFunc
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysAllocString
VariantCopy
SysAllocStringByteLen
VarUI4FromStr
LoadRegTypeLi
LoadTypeLi
VarBstrCat
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ