Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
40d0c45a341690f87967d8092a2de38e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
40d0c45a341690f87967d8092a2de38e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
40d0c45a341690f87967d8092a2de38e_JaffaCakes118
Size
728KB
MD5
40d0c45a341690f87967d8092a2de38e
SHA1
39806f8b65db8e69502b3de6f3af9bd8793d9d4e
SHA256
9ea9e2bb7d0f9e3db5ceb21f226901ea9f782f291fab0e90a83f60e81abc235f
SHA512
bab3700824d75756db5c32f4d1447655db60046ea7f606d6c3fb44eb0c2754c9fd50b510ed3bbb98da295ddfdc8d45fffe006d6359b109f5b7dfcbdf84838c1b
SSDEEP
12288:lEcF8D2K53tGcAOYYsLN2Z8bbXM/meGDgGeItoEc9GspWZhASRXHYnrmW:lEc8H5fMLN2Kb7MrGlFtov9GsqRXHYr1
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontA
CreateFontIndirectA
CreateSolidBrush
DeleteDC
DeleteObject
GetStockObject
PatBlt
SelectObject
SetBkColor
SetBkMode
SetTextColor
AddAtomA
CloseHandle
CreateMutexA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
ExitThread
FindAtomA
FindResourceA
GetAtomNameA
GetCommandLineA
GetCurrentThreadId
GetFileAttributesA
GetLastError
GetLocaleInfoA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDefaultLCID
GetTempPathA
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
LoadResource
LockResource
MultiByteToWideChar
ReleaseMutex
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
_close
_fdopen
_open
_read
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_errno
_fstati64
_iob
_lseeki64
_onexit
_setmode
abort
atexit
atoi
calloc
fclose
fflush
fopen
fputc
fputs
free
fwrite
getenv
iswctype
localeconv
malloc
memchr
memmove
printf
realloc
setlocale
setvbuf
signal
sprintf
strchr
strcmp
strcoll
strcpy
strerror
strftime
strncpy
strrchr
strtok
strxfrm
tolower
towlower
towupper
vfprintf
wcscoll
wcsftime
wcslen
wcsxfrm
CreateStreamOnHGlobal
SHBrowseForFolderA
SHGetFolderPathA
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
BeginPaint
ClientToScreen
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EnableWindow
EndPaint
GetCapture
GetDC
GetMessageA
GetSystemMetrics
GetWindowRect
LoadCursorA
LoadIconA
MessageBoxA
MessageBoxExA
PostQuitMessage
RedrawWindow
RegisterClassExA
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageA
SetCapture
SetCursor
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
HttpOpenRequestA
HttpQueryInfoA
HttpSendRequestA
InternetAttemptConnect
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetOpenUrlA
InternetReadFile
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipDeleteGraphics
GdipDisposeImage
GdipDrawImageI
GdipFree
GdiplusShutdown
GdiplusStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE