Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
dba901c79194668f9e6fb3618e310c9d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dba901c79194668f9e6fb3618e310c9d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
dba901c79194668f9e6fb3618e310c9d_JaffaCakes118
Size
1.1MB
MD5
dba901c79194668f9e6fb3618e310c9d
SHA1
ca0e6fe4ef052f9624b05bcdecf19957075a5426
SHA256
26f401c84d6c9a5b5d9cd71e3589c0bcdbc5bac5e8b2b05eec0ff4abe3f632f1
SHA512
78119d63a49daaa08a5157518284222f12fbfac41fa1f41bf4c1ce747b59839fa0065f30bb95dbda7619b9a4387cdec6ad0fb885c4a9c12c139947f603dabfd8
SSDEEP
6144:HlypigdZ7vpjWfDUNtUVZSht3kH64cvbwQOAp/x72d2XL+gSqHa8:FyogdZDp3DOq/xiQFSKB
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TerminateProcess
Process32First
GetModuleFileNameA
WriteProcessMemory
Module32Next
Module32First
GetSystemDirectoryA
GetSystemTime
GetFileAttributesA
Sleep
GetEnvironmentVariableA
GetLongPathNameA
BackupSeek
BackupRead
GlobalMemoryStatus
CreateMutexA
CreateProcessA
FreeLibrary
GetPrivateProfileIntA
HeapFree
HeapAlloc
GetProcessHeap
LocalAlloc
FileTimeToSystemTime
Process32Next
CreateThread
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
FlushFileBuffers
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetTimeZoneInformation
WideCharToMultiByte
CreateToolhelp32Snapshot
GetLastError
OpenProcess
Thread32First
OpenThread
ReadProcessMemory
VirtualQueryEx
TerminateThread
SuspendThread
Thread32Next
GetVersionExA
GetWindowsDirectoryA
MoveFileExA
CreateDirectoryA
DuplicateHandle
SetLastError
GetLogicalDriveStringsA
WinExec
GetDriveTypeA
RemoveDirectoryA
DeleteFileA
CreateFileA
CreateFileMappingA
GetFileSize
MapViewOfFile
UnmapViewOfFile
IsBadReadPtr
FlushViewOfFile
SetFilePointer
ReadFile
WriteFile
FindFirstFileA
SetFileAttributesA
WritePrivateProfileStringA
CopyFileA
GetPrivateProfileStringA
FindNextFileA
FindClose
GetLocalTime
LoadLibraryA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
LocalFree
SetStdHandle
GetStdHandle
CloseHandle
GetFileTime
SetHandleCount
SetEndOfFile
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetStartupInfoA
ExitProcess
GetFileType
HeapReAlloc
SetEnvironmentVariableA
BeginPaint
LoadIconA
FillRect
EndPaint
KillTimer
GetWindowTextA
ShowWindow
SetTimer
SetWindowTextA
LoadBitmapA
GetDlgItem
SendMessageA
LoadCursorA
SetClassLongA
SetWindowLongA
EndDialog
DialogBoxParamA
GetClientRect
CreateFontA
CreateSolidBrush
SelectObject
DeleteObject
CreatePen
SetTextColor
SetBkColor
DuplicateToken
LookupPrivilegeValueA
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteValueW
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyA
GetSidLengthRequired
InitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAceEx
RegSetKeySecurity
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetFileSecurityA
AdjustTokenPrivileges
MapGenericMask
AccessCheck
RegOpenKeyExA
RegSetValueExA
GetTokenInformation
LookupAccountSidA
RegCreateKeyA
GetUserNameA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
AllocateAndInitializeSid
SetEntriesInAclA
SetNamedSecurityInfoA
OpenProcessToken
FreeSid
SHGetFolderPathA
ord17
SHDeleteValueA
SHSetValueA
SHDeleteValueW
StrStrIA
PathFileExistsA
SHGetValueA
StrStrA
SHDeleteKeyA
SHDeleteKeyW
GetModuleFileNameExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ