Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
9c480aca9de4e43ca544f4e5fd1543ba_JaffaCakes118.exe
Resource
win7-20240221-en
Target
9c480aca9de4e43ca544f4e5fd1543ba_JaffaCakes118
Size
688KB
MD5
9c480aca9de4e43ca544f4e5fd1543ba
SHA1
c27559ebd3de8bdd44cd084ebf7d40e3eeeab5d2
SHA256
adb90d6e1f19106afc81f4886aa941ca6e53cfc21fbed25c8ea883b68a21db34
SHA512
998437280e20c5b7bceb7eb2c438d8d41eecb66a7b16a480e1f1bea0eb1ae162a47cf93ea0e999fa2fd84d8b0fa4ce3cb53b464eb924bdb71e68a9c33c922783
SSDEEP
12288:oxrAPe4rN/Kp2ddvosZRFpCtJ1QsLBBYa7lJC/okztwomo4R6SXcjx+wxRPWwf2D:oxMzI2ddv3CtJ1QYlJC/P54RLXwYw/bE
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetUserNameExA
GetUserNameExW
InitializeSecurityContextW
FreeCredentialsHandle
AcquireCredentialsHandleW
QuerySecurityPackageInfoW
FreeContextBuffer
CompleteAuthToken
SCardReleaseContext
SCardGetStatusChangeW
SCardListReadersW
SCardEstablishContext
send
__WSAFDIsSet
WSAIoctl
closesocket
select
getaddrinfo
WSAStartup
socket
connect
htons
freeaddrinfo
setsockopt
inet_addr
recv
ioctlsocket
WSAGetLastError
WSACleanup
CreateEnvironmentBlock
DestroyEnvironmentBlock
MiniDumpWriteDump
WTSEnumerateSessionsW
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
CoUninitialize
GetFileSize
SetStdHandle
ReadFile
FlushFileBuffers
EraseTape
GetLocalTime
IsProcessorFeaturePresent
GetTimeZoneInformation
FileTimeToLocalFileTime
FormatMessageA
FormatMessageW
lstrcmpiW
lstrcpynA
lstrcpynW
lstrcatA
TlsGetValue
TlsFree
WriteFileEx
CreateMutexA
CreateEventA
CreateEventW
CreateFileMappingW
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetStartupInfoA
GetCommandLineW
GetEnvironmentVariableA
SetEnvironmentVariableA
ExpandEnvironmentStringsA
FindResourceA
GetProfileStringW
GetSystemDirectoryA
GetCurrentDirectoryA
GetFullPathNameA
CreateFileA
DeleteFileA
DeleteFileW
FindFirstFileA
SearchPathA
GetComputerNameA
QueryPerformanceFrequency
GetACP
WideCharToMultiByte
CompareStringW
LCMapStringA
LCMapStringW
GetDateFormatA
GetDateFormatW
IsValidLocale
GetUserDefaultUILanguage
GetStringTypeA
GetStringTypeW
FoldStringW
GetConsoleMode
SetEvent
GetConsoleOutputCP
MultiByteToWideChar
WriteFile
WaitForSingleObject
CreateFileW
GetCurrentThreadId
GetSystemDirectoryW
OpenProcess
lstrcatW
CloseHandle
LoadLibraryW
WaitNamedPipeW
GetExitCodeProcess
GetTickCount
GetVersionExW
GetModuleFileNameW
SizeofResource
LockResource
FindResourceW
LoadLibraryExW
SetHandleInformation
ExpandEnvironmentStringsW
InterlockedDecrement
CreatePipe
PeekNamedPipe
GetTimeFormatA
FreeResource
MoveFileExW
ExitProcess
CreateProcessW
LoadResource
LoadLibraryA
lstrcmpiA
GlobalAlloc
InterlockedIncrement
CreateDirectoryW
GetFileSizeEx
SetEndOfFile
MoveFileW
GetDriveTypeW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
lstrcmpW
SetFileTime
ProcessIdToSessionId
SleepEx
GetFileTime
GetLogicalDrives
FindFirstFileW
FindNextFileW
RemoveDirectoryW
FindClose
SetFileAttributesW
lstrlenA
lstrlenW
QueryPerformanceCounter
OpenEventW
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
FileTimeToSystemTime
GetCurrentThread
GetSystemInfo
GetComputerNameW
GetSystemTimeAsFileTime
TlsSetValue
SetThreadPriority
DuplicateHandle
TlsAlloc
CreateSemaphoreW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeCriticalSection
IsDebuggerPresent
ResumeThread
GetOverlappedResult
SetLastError
GetLastError
TerminateThread
ExitThread
GetProcessId
CreateThread
ConvertFiberToThread
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStringsW
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
GetProcessHeap
HeapFree
HeapReAlloc
HeapAlloc
LocalFree
LocalLock
LocalReAlloc
LocalAlloc
GlobalMemoryStatus
GlobalFree
GlobalUnlock
GlobalLock
GlobalSize
GetProcAddress
FreeLibrary
Sleep
lstrcmpA
ResetEvent
EncodePointer
DecodePointer
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
WaitForSingleObjectEx
GetStartupInfoW
InitializeSListHead
RaiseException
RtlUnwind
GetFileType
GetModuleHandleExW
FreeLibraryAndExitThread
GetStdHandle
GetUserDefaultLCID
EnumSystemLocalesW
SetFilePointerEx
ReadConsoleW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
WriteConsoleW
GetConsoleCP
HeapSize
DefWindowProcW
OpenDesktopW
FindWindowW
IntersectRect
EnumWindows
IsWindowVisible
WinHelpW
IsDialogMessageA
LoadStringW
LoadIconW
FindWindowA
GetParent
GetDesktopWindow
SetProcessDefaultLayout
SetWindowLongW
GetWindowLongW
OffsetRect
GetSysColor
GetCursorPos
SetCursor
MessageBoxW
GetWindowTextW
SetWindowTextW
SetWindowTextA
SetScrollPos
InvalidateRgn
EndPaint
ReleaseDC
GetDC
SetForegroundWindow
GetForegroundWindow
SetActiveWindow
UpdateWindow
DrawTextW
TrackPopupMenu
SetMenuItemBitmaps
DeleteMenu
AppendMenuA
VkKeyScanExW
GetSystemMenu
GetMenuState
SetMenu
GetWindowRect
GetSystemMetrics
EqualRect
EnableWindow
KillTimer
SetTimer
ReleaseCapture
SetCapture
CharNextW
CharNextA
CharUpperW
IsClipboardFormatAvailable
SetClipboardData
GetDlgCtrlID
SendDlgItemMessageA
IsDlgButtonChecked
GetDlgItemTextA
EndDialog
DialogBoxIndirectParamA
DialogBoxParamW
IsIconic
SetWindowPlacement
SetWindowPos
MoveWindow
ShowWindow
DestroyWindow
CreateWindowExA
RegisterClassA
CallWindowProcA
PostQuitMessage
DefWindowProcA
PostMessageW
SendMessageW
PeekMessageA
DispatchMessageA
GetMessageW
GetMessageA
RegisterWindowMessageA
GetKeyboardLayout
wsprintfW
SetClipboardViewer
GetClipboardOwner
GetIconInfo
MsgWaitForMultipleObjects
GetThreadDesktop
CloseDesktop
OpenClipboard
MapVirtualKeyW
GetAsyncKeyState
LoadKeyboardLayoutW
SendMessageTimeoutW
SystemParametersInfoW
keybd_event
SetThreadDesktop
GetKeyboardState
ExitWindowsEx
DispatchMessageW
GetCursorInfo
ChangeClipboardChain
CloseClipboard
EmptyClipboard
OpenInputDesktop
GetClipboardData
LoadMenuW
GetUserObjectInformationW
mouse_event
MessageBoxA
CreateWindowExW
RegisterClassExW
PeekMessageW
DestroyMenu
PostThreadMessageW
SelectPalette
CreateRectRgnIndirect
GetSystemPaletteEntries
GetDeviceCaps
GetDIBits
RealizePalette
GdiFlush
CreateDIBSection
BitBlt
CreatePalette
GetRegionData
CombineRgn
GetBitmapBits
GetObjectW
DeleteObject
GetTextFaceW
SetWindowExtEx
TextOutW
GetObjectA
SetAbortProc
AbortDoc
EndPage
EndDoc
StartDocW
StartDocA
SetTextColor
StretchBlt
SetBkMode
SetBkColor
SelectObject
DeleteDC
CreateSolidBrush
CreateFontIndirectW
CreateDCW
CreateCompatibleDC
CreateCompatibleBitmap
ClosePrinter
OpenPrinterW
CommDlgExtendedError
PrintDlgExW
ChooseFontA
FindTextW
ChooseColorA
GetFileTitleW
GetSaveFileNameW
AccessCheck
OpenServiceW
ConvertSidToStringSidW
GetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegisterServiceCtrlHandlerExW
SetTokenInformation
SetSecurityDescriptorOwner
AllocateAndInitializeSid
GetSidSubAuthority
IsValidSecurityDescriptor
SetServiceStatus
FreeSid
InitializeAcl
DuplicateToken
GetLengthSid
AddAccessAllowedAce
OpenThreadToken
SetSecurityDescriptorGroup
CreateProcessAsUserW
StartServiceCtrlDispatcherW
DuplicateTokenEx
RegDeleteKeyA
RegOpenKeyExW
RegCreateKeyExA
RegOpenKeyExA
StartServiceA
OpenSCManagerA
CreateServiceA
ControlService
RegSetValueExW
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegDeleteValueA
RegCreateKeyA
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
IsTextUnicode
EnumServicesStatusExW
StartServiceW
DeleteService
OpenSCManagerW
CloseServiceHandle
QueryServiceStatus
CreateServiceW
InitiateSystemShutdownExW
LookupPrivilegeValueW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteValueW
RegQueryValueExW
RevertToSelf
ImpersonateLoggedOnUser
QueryServiceConfigW
DragFinish
CommandLineToArgvW
Shell_NotifyIconA
ShellExecuteW
SHGetSpecialFolderPathW
DragQueryFileW
SysAllocString
SysFreeString
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ