Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
167b72d0d0c43e2108b5e35e391097f7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
167b72d0d0c43e2108b5e35e391097f7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
167b72d0d0c43e2108b5e35e391097f7_JaffaCakes118
Size
152KB
MD5
167b72d0d0c43e2108b5e35e391097f7
SHA1
76c1b23cd862941176dbcf772be003e8e2ad22a8
SHA256
dc541ba190a70299e6ee57d3a660f886bbae07d466254e8264c7bbe824b97153
SHA512
610ecdc7e824177eb7548f7e5dcf7f82a7e2c5a99f911681bc20d2a3d1496413e8f624fe86cac67f87997d8d2114be174d21186fb7b000eec78c56c4d55ad92d
SSDEEP
3072:qxhmkEmFz3No3HG3fypoEx6UiVAg/nSQp:XkE63NgHG3RU0Ag/S0
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RtlUnwind
HeapFree
GetCommandLineA
HeapSetInformation
EncodePointer
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
InterlockedIncrement
GetACP
GetOEMCP
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ExitProcess
WriteFile
GetStdHandle
HeapCreate
GetSystemDefaultLangID
ReadFile
SetStdHandle
GetFileType
SetFilePointer
SetHandleCount
HeapAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapSize
GetConsoleCP
GetConsoleMode
InterlockedExchange
FlushFileBuffers
HeapReAlloc
SetEndOfFile
GetProcessHeap
LoadLibraryA
GetModuleHandleA
FreeLibrary
FindClose
GetExitCodeProcess
OpenProcess
WaitForSingleObject
GetCurrentProcessId
CloseHandle
Sleep
GetLastError
GetCurrentThread
GetCurrentProcess
GetLocalTime
RaiseException
CreateThread
GetCommandLineW
GetPrivateProfileStringA
CreateToolhelp32Snapshot
Process32First
Process32Next
InterlockedDecrement
ResetEvent
DeleteCriticalSection
SetEvent
LocalAlloc
LocalFree
LoadResource
LockResource
HeapDestroy
SizeofResource
PostQuitMessage
TranslateMessage
DestroyWindow
GetSystemMetrics
ReleaseDC
GetDC
UpdateWindow
ShowWindow
EndPaint
BeginPaint
SetDIBits
CreatePalette
CreateCompatibleDC
SelectPalette
RealizePalette
SelectObject
BitBlt
GetDeviceCaps
DeleteObject
UnrealizeObject
CreateCompatibleBitmap
SetSecurityDescriptorGroup
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
InitializeSecurityDescriptor
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
ImpersonateSelf
RegCloseKey
SetSecurityDescriptorOwner
SysAllocStringByteLen
CreateErrorInfo
SetErrorInfo
GetErrorInfo
SysFreeString
SysStringByteLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ