Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
aaf26574e0e7b3121f4a2777572ecd72_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aaf26574e0e7b3121f4a2777572ecd72_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
aaf26574e0e7b3121f4a2777572ecd72_JaffaCakes118
Size
572KB
MD5
aaf26574e0e7b3121f4a2777572ecd72
SHA1
398369bf8a41f363addacf4aed3865c8ef0ecb7b
SHA256
62e894e5cddd2c2367eb2b6581884905ef14813cd48f79431c5d8d4b94bfa120
SHA512
e3cb8827206c99078d16f1314b835630c753a578d84fdb0c49405400ef6534640f91a0132af42befcce63b35e45e520965daea7b6e48cc3508d956230ef07dcc
SSDEEP
12288:EUN3/tQPLTNlO5myAvENleRDro5bxExoglseXA:ZQPNg5mZvENleRDroNxEjrXA
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
DeleteFileW
CreateFileW
SetFilePointer
SetFilePointerEx
GetTempPathW
GetFileSize
GetCommandLineW
GetTickCount
ReleaseMutex
SetCurrentDirectoryW
SystemTimeToFileTime
CreateFileMappingW
VirtualQuery
UnmapViewOfFile
Sleep
CreateThread
GetLocaleInfoW
WideCharToMultiByte
GlobalFree
lstrcpynW
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
RtlUnwind
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
InterlockedIncrement
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetConsoleCP
GetConsoleMode
LCMapStringW
SetStdHandle
WriteConsoleW
ReadFile
InterlockedDecrement
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
lstrcmpiW
GetLastError
SetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
SetHandleCount
lstrlenW
FlushFileBuffers
CloseHandle
GetClassNameW
GetDlgItem
SetFocus
IsChild
EndPaint
FillRect
BeginPaint
RegisterWindowMessageW
RedrawWindow
CreateAcceleratorTableW
InvalidateRect
GetDesktopWindow
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
MsgWaitForMultipleObjects
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CallWindowProcW
GetWindowLongW
DefWindowProcW
CreateWindowExW
DestroyWindow
LoadCursorW
GetClassInfoExW
RegisterClassExW
SetTimer
KillTimer
SetWindowLongW
GetSysColor
UnregisterClassA
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
CreateSolidBrush
GetOpenFileNameW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CLSIDFromString
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
SysAllocString
VarUI4FromStr
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysStringLen
VariantCopy
LoadRegTypeLi
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ