Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
e07c26e0ec3a6311e8ed113f948b130d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e07c26e0ec3a6311e8ed113f948b130d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
e07c26e0ec3a6311e8ed113f948b130d_JaffaCakes118
Size
526KB
MD5
e07c26e0ec3a6311e8ed113f948b130d
SHA1
bf24cf98e796004ed9a9b7fd6676ae8f6f7c81e6
SHA256
8e2f07271cbaabfbc6f4b649d6a24631bd1e748e1a0f3c380dc4e2e8e65880df
SHA512
e9a57df7bdc6c13c8a5ad30ed1bf9bf5c53f25ffd78247049c4904789702b547f6762b7868bc26419408fe07621f135f693791931124f3c6f13a0e5845c9016b
SSDEEP
12288:rcW5JzjN2rq0x2twg65BTHvlrlzd6o0zpivQmh7Psb:oWzfN70x2twg6zzd6zzkY4O
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
CreateMutexW
SetEvent
SetFilePointerEx
GetTempPathW
RemoveDirectoryW
GetCommandLineW
GetCurrentProcessId
GetTickCount
CopyFileW
CreateFileMappingW
UnmapViewOfFile
CreateThread
ResumeThread
GetLocaleInfoW
WideCharToMultiByte
lstrcmpA
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
FlushFileBuffers
CloseHandle
CreateFileW
ReadFile
WriteConsoleW
SetStdHandle
InterlockedIncrement
LCMapStringW
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
lstrlenW
InterlockedDecrement
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
DefWindowProcW
CreateWindowExW
DestroyWindow
LoadCursorW
GetClassInfoExW
RegisterClassExW
SetTimer
KillTimer
SetWindowLongW
CreateAcceleratorTableW
GetWindowLongW
CallWindowProcW
CharNextW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
UnregisterClassA
InvalidateRect
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
FindWindowW
GetDesktopWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CreateSolidBrush
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
GetOpenFileNameW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoGetInterfaceAndReleaseStream
StringFromCLSID
CoInitialize
CoTaskMemAlloc
VariantCopy
LoadRegTypeLi
VarUI4FromStr
SysStringLen
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysAllocString
LoadTypeLi
PathAddBackslashW
PathIsDirectoryW
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ