Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
Static task
static1
Behavioral task
behavioral1
Sample
325f424fc3cd20531d044f537bf9b1a8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
325f424fc3cd20531d044f537bf9b1a8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
325f424fc3cd20531d044f537bf9b1a8_JaffaCakes118
Size
1.4MB
MD5
325f424fc3cd20531d044f537bf9b1a8
SHA1
fb72ddf6559d5b8792d9bc7d0c4fac3d0736d9c8
SHA256
5bef652d656da7885343170ef5bbaa8c9bc2ddf0a09d3f3c6a5a6279b53cf59b
SHA512
039bbd93e673dc6a78ad124db212ba3cd68fda4eaf1c1d67535157c92acefe31cf2b6402840b118e26fd11ca6b3286d458b89d59b2ff97ed5e0f851bf5b7367e
SSDEEP
24576:2X3X+cbA/3yHN5V5hWLkfm7MP+h2/hwgM831dsturMAxtWzNkdnM9Mkxw:2ucE/3o5V5hWYxPwgN31dcu4AxQYr9
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTempPathA
ExitProcess
DeleteFileA
FreeLibrary
lstrcpyA
GetProcAddress
LoadLibraryA
VirtualFree
CloseHandle
WriteFile
GetWindowsDirectoryA
CreateFileA
lstrcatA
CompareStringA
GetCurrentDirectoryA
lstrlenA
ReadFile
SetFilePointer
VirtualAlloc
GetModuleFileNameA
InterlockedIncrement
GetModuleHandleA
SetCursor
LoadCursorA
wsprintfA
ShowWindow
FindWindowA
MessageBoxA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ