Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
30be3f68e17d51767bb8cbc68888d8ef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30be3f68e17d51767bb8cbc68888d8ef_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
30be3f68e17d51767bb8cbc68888d8ef_JaffaCakes118
Size
841KB
MD5
30be3f68e17d51767bb8cbc68888d8ef
SHA1
ad55604dc1bd747349754f0c0b711653d0c12290
SHA256
db99646a54d5e0e5be34cfa3bcee8c70b8d262893bc3fbaeeec91bb3368dfc99
SHA512
1db7bb028afe2505099c97b151dc99066f4b091527e391b63069d3c31837ebe8947cdb1d23a0e8e95fa82ab2347b4912fb21e2fcf5610d4a69c9cfe83b0492a9
SSDEEP
12288:4Br5sd3tEvsWraQ4etQPdl1X6iUrCNvTOWUz5LnEo3PZOImTr8gKc2ZYOEGIb34R:4dTsDXYKaPZOvTr8pFcGUhgJ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\jenkins\workspace\mini_tool_local\ReleaseGlobal\toolmini.pdb
GetFileSize
GetTickCount
WriteFile
DeleteFileW
WideCharToMultiByte
MultiByteToWideChar
SetEnvironmentVariableW
FreeResource
LockResource
SizeofResource
LoadResource
FindResourceW
GetModuleHandleW
GetLastError
LeaveCriticalSection
EnterCriticalSection
lstrcpyA
lstrcatA
LoadLibraryA
GlobalFree
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateEventW
WaitForMultipleObjects
CancelIo
GetOverlappedResult
WaitForSingleObject
SetEvent
SetFilePointerEx
SetEndOfFile
GetFileSizeEx
OpenProcess
GetCurrentProcessId
GetVersionExW
GetNativeSystemInfo
GetUserDefaultUILanguage
GetCommandLineW
LocalFree
Sleep
GetTempPathW
CreateDirectoryW
RemoveDirectoryW
FindClose
FindNextFileW
FindFirstFileW
CreateProcessW
GetExitCodeProcess
GetModuleFileNameW
ExitProcess
SetUnhandledExceptionFilter
GetCurrentThreadId
InterlockedExchange
FindResourceExW
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
GetPrivateProfileSectionW
CreateMutexW
ExpandEnvironmentStringsW
DeviceIoControl
GetProcessHeap
OutputDebugStringW
ResetEvent
TryEnterCriticalSection
AreFileApisANSI
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
FreeLibrary
CloseHandle
ReadFile
CreateFileW
GetProcAddress
WriteConsoleA
SetStdHandle
GetLocaleInfoW
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
GetModuleHandleA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapDestroy
HeapCreate
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
LoadLibraryW
Process32NextW
Process32FirstW
SetFilePointer
CreateToolhelp32Snapshot
GetOEMCP
GetACP
GetStringTypeW
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
HeapAlloc
GetStartupInfoW
HeapFree
CreateThread
ExitThread
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InitializeCriticalSection
InterlockedCompareExchange
TranslateMessage
SendMessageW
CreateDialogParamW
GetWindowRect
GetSystemMetrics
SetWindowPos
GetMessageW
IsDialogMessageW
DispatchMessageW
PostThreadMessageW
PostMessageW
ShowWindow
SetWindowTextW
GetDlgItem
RegEnumKeyExW
RegCloseKey
RegEnumValueW
RegOpenKeyExW
CommandLineToArgvW
ShellExecuteExW
ShellExecuteW
SHGetSpecialFolderPathW
SHFileOperationW
CoInitialize
CoCreateGuid
PathRemoveExtensionW
StrStrIW
PathFindFileNameW
PathIsURLW
PathAppendW
PathCombineW
PathGetArgsW
PathIsDirectoryW
PathRemoveFileSpecW
PathStripPathW
PathIsRootW
PathFileExistsW
GetProcessImageFileNameW
__WSAFDIsSet
inet_ntoa
socket
htons
recvfrom
sendto
WSAStartup
WSAGetLastError
select
ord17
GetAdaptersAddresses
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ