Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a87e7b71a0db6de8421bed16ccacfdb7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a87e7b71a0db6de8421bed16ccacfdb7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
a87e7b71a0db6de8421bed16ccacfdb7_JaffaCakes118
Size
475KB
MD5
a87e7b71a0db6de8421bed16ccacfdb7
SHA1
3e43941deb1a024156f459be06a6ea4088cb7eb9
SHA256
6d7732cbc6af86dcbdd92a3dfd2217b2ae93311a04bc19f0030219baf1573646
SHA512
62ba4aef91dfbf178eda1bc981586c1410f57656708c549fa1ababe7e140d8e2a5e523570933f792fe13e00e8403b54e2e09369ccff0268aca5c590b18aa0044
SSDEEP
6144:R2ZevHyB20h2M/cxxJOljZUBfocr1HaJrUJ0TDGTetNoHhra0FjrVPEjj/TeV3Vu:3vNV4GF1+LTDGT4NMmABg/VpHn
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
SHDeleteKeyW
OpenThread
TerminateThread
SetThreadExecutionState
CloseHandle
GetTickCount
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
GetEnvironmentVariableW
OutputDebugStringA
OutputDebugStringW
GetDriveTypeW
GetTempPathW
VerSetConditionMask
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
GetLastError
WaitForSingleObject
GetLogicalDrives
DeviceIoControl
FormatMessageW
CreateProcessW
GetDiskFreeSpaceExW
CreateFileA
VerifyVersionInfoW
MultiByteToWideChar
WideCharToMultiByte
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
CreateTimerQueue
SetEvent
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetCurrentThreadId
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetThreadTimes
DecodePointer
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
ExitThread
GetModuleHandleExW
HeapAlloc
HeapFree
ExitProcess
GetStdHandle
WriteFile
GetACP
GetStringTypeW
GetFileType
GetTimeZoneInformation
CompareStringW
LCMapStringW
GetProcessHeap
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
HeapSize
HeapReAlloc
WriteConsoleW
CreateFileW
GetCurrentProcess
GetProcAddress
GetSystemDefaultLangID
Sleep
GetThreadPriority
FreeLibrary
CloseClipboard
SetClipboardData
ExitWindowsEx
OpenClipboard
PostMessageW
FindWindowExW
EmptyClipboard
MessageBoxW
wsprintfW
StringFromCLSID
CoTaskMemFree
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
AllocateAndInitializeSid
OpenProcessToken
FreeSid
LookupPrivilegeValueW
CheckTokenMembership
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegDeleteValueA
RegDeleteKeyW
RegDeleteKeyA
RegCreateKeyExW
RegCloseKey
RegCreateKeyExA
AdjustTokenPrivileges
ShellExecuteExW
SHFileOperationW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ