Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a55993336026846a5320882220f260aa_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a55993336026846a5320882220f260aa_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
a55993336026846a5320882220f260aa_JaffaCakes118
Size
581KB
MD5
a55993336026846a5320882220f260aa
SHA1
0976c88b3033b2b6c54245cc6dfc66559dfa937c
SHA256
0812b09342753b06f9cbe039cc41e6c846bcbc640bf9385cbe62231a8dd8624c
SHA512
c1beb8b935fcdf31a40420f13e22855f9aa146a37dea8d885f929530ff59ce5c38df2b16fea7bf15a2580c27eb08a382cc13cc6e0254afedc44ff95c4075a9d2
SSDEEP
12288:3eextrLtKw0w7qA+UqyHhHrj/GZ9DPDCUq1XaNMHMPHnCvE:jKo7XayHhCPDCUq1XaNrHnCvE
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
InitializeCriticalSection
WaitForMultipleObjects
WaitForSingleObject
DeleteFileW
SetEndOfFile
SetFileTime
CreateDirectoryW
RemoveDirectoryW
GetTempFileNameW
SetCurrentDirectoryW
ResumeThread
GlobalFree
HeapAlloc
lstrcmpA
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
FlushFileBuffers
CloseHandle
CreateFileW
ReadFile
WriteConsoleW
SetStdHandle
GetModuleFileNameW
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
SetFilePointer
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
lstrlenW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
LCMapStringW
IsProcessorFeaturePresent
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
KillTimer
GetClassInfoExW
SetTimer
RegisterClassExW
LoadCursorW
DestroyWindow
CreateWindowExW
SetWindowLongW
GetFocus
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
InvalidateRect
GetDesktopWindow
UnregisterClassA
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
UpdateLayeredWindow
GetParent
SendMessageW
LoadIconW
PostThreadMessageW
FindWindowW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CallWindowProcW
GetWindowLongW
DefWindowProcW
CreateSolidBrush
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
DoEnvironmentSubstW
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoTaskMemAlloc
LoadTypeLi
SysAllocStringByteLen
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysAllocString
VariantCopy
SysStringLen
VarUI4FromStr
LoadRegTypeLi
SysStringByteLen
PathAddBackslashW
PathFileExistsW
PathIsDirectoryW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ