Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
9cfa6fe70f0886ee46bb3b35f768cd0d_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9cfa6fe70f0886ee46bb3b35f768cd0d_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
9cfa6fe70f0886ee46bb3b35f768cd0d_JaffaCakes118
Size
1.8MB
MD5
9cfa6fe70f0886ee46bb3b35f768cd0d
SHA1
07309e7fc1356f6bf05f87d3d7397378f1a34e19
SHA256
c51f11ae52aef78699233174c52ec1ac3a781f7496ddc7efe369cc140f05842f
SHA512
55658d73b47dd391874250b2e1b5086b301ee4a677c0fc7ad703f31c878ced8ddb9c8d348e054cf077be7e6f4d89c646f1743a2c2f7b1b8cf4dd17dd440e8632
SSDEEP
24576:HtbPrrbTPUy9A+hZ1HjqQSUHi2Ha50hUXJS5GcRbhgaCoszGmltuaebBIPKUy0jq:lrkydhZ1HjqiHs0CcG4gaCo/mltrenYq
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Branch\win\Release\stubs\x86\setup.pdb
WideCharToMultiByte
MultiByteToWideChar
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
CreateFileW
WriteFile
GetLastError
GetModuleHandleW
GetProcAddress
GetSystemDirectoryW
LoadLibraryExW
FreeLibrary
lstrcmpiW
LeaveCriticalSection
RaiseException
EnterCriticalSection
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
DecodePointer
CloseHandle
GetShortPathNameW
CreateEventW
GetCurrentProcessId
GetCommandLineW
SetCurrentDirectoryW
CreateThread
WaitForSingleObject
SetEvent
GetDriveTypeW
GetFileAttributesW
SetFileAttributesW
CopyFileW
GetExitCodeThread
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
GetTempPathW
GetTempFileNameW
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
SetLastError
CreateDirectoryW
GetLogicalDriveStringsW
GetFileSize
ReadFile
GetDiskFreeSpaceExW
GetEnvironmentVariableW
SetFilePointer
SetEndOfFile
InterlockedExchange
EnumResourceLanguagesW
GetLocaleInfoW
GetSystemDefaultLangID
GetUserDefaultLangID
LoadLibraryW
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
CreateProcessW
GetExitCodeProcess
GetWindowsDirectoryW
GetCurrentProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
InitializeCriticalSection
OutputDebugStringW
GetLocalTime
FlushFileBuffers
CreateNamedPipeW
ConnectNamedPipe
FormatMessageW
GetFileTime
GetStdHandle
GetStringTypeW
MoveFileW
ResetEvent
GlobalFree
TerminateThread
GetVersionExW
MulDiv
Sleep
LocalFree
LocalAlloc
CompareFileTime
CopyFileExW
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RtlUnwind
GetACP
ExitProcess
GetModuleHandleExW
GetFileType
GetCPInfo
IsValidCodePage
GetOEMCP
LCMapStringW
FindFirstFileExW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ