Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
421505a1b3009f02aa3d858ae3ed754b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
421505a1b3009f02aa3d858ae3ed754b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
421505a1b3009f02aa3d858ae3ed754b_JaffaCakes118
Size
728KB
MD5
421505a1b3009f02aa3d858ae3ed754b
SHA1
ce1888773710eecb42d94f9014c876e325e05cfd
SHA256
04ee6d54c0a1dc6c7d16a73c14240472a44f4280840e4c5e6cb9e31e7f207595
SHA512
cbab86002e008f082c5b76761fae3bcf121e8e18f6f41c07e6152c909d827ce9a77c3b6dceb7cefc350b91a7d5e74e0fbe87deea734e1954dbf1c3835690e282
SSDEEP
12288:lEcF8D2K53tGcAOYYsLN2Z8bbXu/meGDgGeItoEc9GspWZhASRXHYnrm9:lEc8H5fMLN2Kb7urGlFtov9GsqRXHYri
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontA
CreateFontIndirectA
CreateSolidBrush
DeleteDC
DeleteObject
GetStockObject
PatBlt
SelectObject
SetBkColor
SetBkMode
SetTextColor
AddAtomA
CloseHandle
CreateMutexA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
ExitThread
FindAtomA
FindResourceA
GetAtomNameA
GetCommandLineA
GetCurrentThreadId
GetFileAttributesA
GetLastError
GetLocaleInfoA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDefaultLCID
GetTempPathA
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
LoadResource
LockResource
MultiByteToWideChar
ReleaseMutex
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
_close
_fdopen
_open
_read
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_errno
_fstati64
_iob
_lseeki64
_onexit
_setmode
abort
atexit
atoi
calloc
fclose
fflush
fopen
fputc
fputs
free
fwrite
getenv
iswctype
localeconv
malloc
memchr
memmove
printf
realloc
setlocale
setvbuf
signal
sprintf
strchr
strcmp
strcoll
strcpy
strerror
strftime
strncpy
strrchr
strtok
strxfrm
tolower
towlower
towupper
vfprintf
wcscoll
wcsftime
wcslen
wcsxfrm
CreateStreamOnHGlobal
SHBrowseForFolderA
SHGetFolderPathA
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
BeginPaint
ClientToScreen
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EnableWindow
EndPaint
GetCapture
GetDC
GetMessageA
GetSystemMetrics
GetWindowRect
LoadCursorA
LoadIconA
MessageBoxA
MessageBoxExA
PostQuitMessage
RedrawWindow
RegisterClassExA
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageA
SetCapture
SetCursor
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
HttpOpenRequestA
HttpQueryInfoA
HttpSendRequestA
InternetAttemptConnect
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetOpenUrlA
InternetReadFile
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipDeleteGraphics
GdipDisposeImage
GdipDrawImageI
GdipFree
GdiplusShutdown
GdiplusStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE