Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
c8ae82f53dbad29d560c9ac2d42501ac_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8ae82f53dbad29d560c9ac2d42501ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c8ae82f53dbad29d560c9ac2d42501ac_JaffaCakes118
Size
1.8MB
MD5
c8ae82f53dbad29d560c9ac2d42501ac
SHA1
38ff6fdbeabc5a7e849891dfcf15176166930ef3
SHA256
8fc8d5b7d1ab3edcafd576e93c4b27a124ef4978c6ac4f096fdedbe12661cb70
SHA512
32416b7b05c516ccb4397a47001fe851a4dd0a25b9c6dabc37bb40690458b3efcfa2cb07044c720c89bf21ff528a9a87aaab80bca74ee9777f640549432324c0
SSDEEP
49152:3rkydhZNHjqPCMZ4tDJi1eJan5guf0quOi:3rky7HjqPzZ4tDJi8snew0Ki
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Branch\win\Release\stubs\x86\setup.pdb
WideCharToMultiByte
MultiByteToWideChar
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
CreateFileW
WriteFile
GetLastError
GetModuleHandleW
GetProcAddress
GetSystemDirectoryW
LoadLibraryExW
FreeLibrary
lstrcmpiW
LeaveCriticalSection
RaiseException
EnterCriticalSection
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
DecodePointer
CloseHandle
GetShortPathNameW
CreateEventW
GetCurrentProcessId
GetCommandLineW
SetCurrentDirectoryW
CreateThread
WaitForSingleObject
SetEvent
GetDriveTypeW
GetFileAttributesW
SetFileAttributesW
CopyFileW
GetExitCodeThread
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
GetTempPathW
GetTempFileNameW
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
SetLastError
CreateDirectoryW
GetLogicalDriveStringsW
GetFileSize
ReadFile
GetDiskFreeSpaceExW
GetEnvironmentVariableW
SetFilePointer
SetEndOfFile
InterlockedExchange
EnumResourceLanguagesW
GetLocaleInfoW
GetSystemDefaultLangID
GetUserDefaultLangID
LoadLibraryW
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
CreateProcessW
GetExitCodeProcess
GetWindowsDirectoryW
GetCurrentProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
InitializeCriticalSection
OutputDebugStringW
GetLocalTime
FlushFileBuffers
CreateNamedPipeW
ConnectNamedPipe
FormatMessageW
GetFileTime
GetStdHandle
GetStringTypeW
MoveFileW
ResetEvent
GlobalFree
TerminateThread
GetVersionExW
MulDiv
Sleep
LocalFree
LocalAlloc
CompareFileTime
CopyFileExW
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RtlUnwind
GetACP
ExitProcess
GetModuleHandleExW
GetFileType
GetCPInfo
IsValidCodePage
GetOEMCP
LCMapStringW
FindFirstFileExW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ