Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b2185a679ad94638e21355d510819f44_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b2185a679ad94638e21355d510819f44_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b2185a679ad94638e21355d510819f44_JaffaCakes118
Size
914KB
MD5
b2185a679ad94638e21355d510819f44
SHA1
7f991202c98460e1b3ae7e88839747282707d3dc
SHA256
7853a7780ad43f72a514ed0ad5a1f8f53f9d3470bbdb396a243091017002d84a
SHA512
ce8aa8a79a32171967946d2030f9bc1ff99b70e8e31c2374854334e3e138416f2c0b6e50f9a6d692df24ff723e9b67c4b8f53971b4878c52ea2f0bc1706be610
SSDEEP
12288:CDEgLJu+ULBxmViY4d58xUiBAGAi1WZY+vmYJXrqZjzY:CxJu+ULzAWfWJBAGAsF+vmc
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\Izidu\Desktop\2019\WindowsSDK7-Samples-master\WindowsSDK7-Samples-master\winui\pictures\pictureacquisition\x64\Release\AcquireTest.pdb
InitCommonControlsEx
GetCommandLineW
CreateDirectoryW
DeleteFileW
OutputDebugStringW
CloseHandle
ExitProcess
CreateThread
VirtualAlloc
LoadResource
SizeofResource
LocalFree
lstrlenW
FindResourceA
FreeConsole
WriteConsoleW
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetConsoleCtrlHandler
GetProcessHeap
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
OutputDebugStringA
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
GetStdHandle
WriteFile
GetModuleFileNameW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleExW
GetACP
GetCurrentThread
HeapAlloc
HeapFree
GetFileType
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
RtlUnwind
DispatchMessageW
PeekMessageW
TranslateMessage
LoadStringW
MsgWaitForMultipleObjects
SendMessageW
GetDesktopWindow
MessageBoxW
DialogBoxParamW
EnableWindow
GetWindowTextLengthW
IsDlgButtonChecked
GetDlgItemTextW
GetDlgItem
EndDialog
CommandLineToArgvW
CoUninitialize
CoCreateInstance
PropVariantCopy
PropVariantClear
CoTaskMemFree
CoInitialize
SysFreeString
DDQGGFGGGGDFFTREydytfDDASQWDAD
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ