Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
fef06645f37dec4ee63676a950644d18_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fef06645f37dec4ee63676a950644d18_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fef06645f37dec4ee63676a950644d18_JaffaCakes118
Size
556KB
MD5
fef06645f37dec4ee63676a950644d18
SHA1
43f921caf07040d793dcaca01b89e82b9f628c1d
SHA256
38464c1c262f5aa3cc53df0033c708999131d76cd628ed3064154366895e7c25
SHA512
7aa8a4bec4736a816c8ccdd4d204f8110e56425eb1835ce7bf11af91fd37d63bc3c12f58574660f8902d662dc72c47f848464049c9a70631c86b7bea3937dd91
SSDEEP
12288:uMgZR9dx+K5o902azFrznZogncpM/D3NJGOLuq6E37aMBTzNdgM:WVdm90BzFxogcpSD3luq6EpHgM
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
CreateMutexW
FlushFileBuffers
ReadFile
ExpandEnvironmentStringsW
GetCommandLineW
GetCurrentProcessId
GetTempFileNameW
GetCurrentDirectoryW
GetSystemTimeAsFileTime
ResumeThread
GetLocaleInfoW
HeapAlloc
lstrcpynW
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
CloseHandle
CreateFileW
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
GetConsoleCP
InterlockedDecrement
SetFilePointer
RtlUnwind
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
WriteFile
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
GetProcessHeap
HeapFree
InterlockedPushEntrySList
GetModuleFileNameW
lstrlenW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
InterlockedCompareExchange
GetWindowLongW
DefWindowProcW
CreateWindowExW
DestroyWindow
CallWindowProcW
GetClassInfoExW
RegisterClassExW
SetTimer
KillTimer
SetWindowLongW
CharNextW
LoadCursorW
DispatchMessageW
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
InvalidateRect
GetDesktopWindow
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
SendMessageW
LoadImageW
LoadIconW
IsWindow
PeekMessageW
GetMessageW
TranslateMessage
UnregisterClassA
CreateSolidBrush
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
Shell_NotifyIconW
CommandLineToArgvW
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoMarshalInterThreadInterfaceInStream
CLSIDFromString
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
VariantClear
SysFreeString
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringLen
VariantCopy
SysAllocString
VariantChangeType
VariantInit
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ