Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
Static task
static1
Behavioral task
behavioral1
Sample
616a756c83382f815b057701f7324822_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
616a756c83382f815b057701f7324822_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
616a756c83382f815b057701f7324822_JaffaCakes118
Size
261KB
MD5
616a756c83382f815b057701f7324822
SHA1
76fb1dcfab80810aa766448ca7da7c6127c1d799
SHA256
2fb0e58343dcbc0b6d785d8afdea91e04c8a5974440219bf1da2eb0134941da3
SHA512
da525f3400e53a575f88a93a228d6790da2fe9b0a5f496aafe3c2b02af82c2af0de85ff5457ae644a10bfe4a4d04dbb2276739354dcf42f11da1d795eb96795c
SSDEEP
3072:bocePmm5Zzitv2DNIgIe4B1Gp87hDdJbtomkMbgZj0D6:bocePmmXziBeNIg7+8pAhDdJWm8ZjZ
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
InitCommonControlsEx
ord6
GetTempFileNameA
GetCurrentDirectoryA
GetModuleFileNameA
GetFullPathNameA
InitializeCriticalSection
SetCurrentDirectoryA
CompareStringA
GetCommandLineA
FindResourceA
LoadResource
LockResource
SizeofResource
LoadLibraryExA
EnumResourceNamesA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleA
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
ReadFile
SetFilePointer
CreateProcessA
GetExitCodeProcess
Sleep
FindFirstFileA
FindClose
GetFileAttributesA
GetFileSize
CopyFileA
GetFullPathNameW
GetFileTime
GetProcAddress
CompareStringW
SetEndOfFile
GetTimeZoneInformation
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
LoadLibraryA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetDriveTypeA
HeapSize
LCMapStringW
LCMapStringA
HeapCreate
HeapDestroy
HeapReAlloc
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetStdHandle
SetHandleCount
SetStdHandle
GetTempPathA
DeleteFileA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetEnvironmentVariableA
GetConsoleMode
GetConsoleCP
WriteFile
ExitThread
GetCurrentThreadId
GetLastError
CreateThread
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetVersionExA
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
ExitProcess
EnterCriticalSection
LeaveCriticalSection
PostMessageA
LoadImageA
LoadIconA
RegisterClassExA
DestroyIcon
MessageBoxA
CharUpperA
LoadCursorA
GetSystemMenu
DispatchMessageA
EnableMenuItem
TranslateMessage
EnableWindow
IsDialogMessageA
SendMessageA
TranslateAcceleratorA
LoadStringA
GetMessageA
GetDlgItem
LoadAcceleratorsA
SetFocus
EndDialog
UpdateWindow
DialogBoxParamA
ShowWindow
GetDlgItemTextA
SendDlgItemMessageA
CheckMenuItem
MessageBeep
GetMenu
CheckMenuRadioItem
DefWindowProcA
SetDlgItemTextA
SetCursor
CreateDialogParamA
PostQuitMessage
GetSaveFileNameA
GetOpenFileNameA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
SHGetPathFromIDListA
SHGetDesktopFolder
SHGetMalloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ