Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
4687f525c433d02424b42af2985660e8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4687f525c433d02424b42af2985660e8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
4687f525c433d02424b42af2985660e8_JaffaCakes118
Size
174KB
MD5
4687f525c433d02424b42af2985660e8
SHA1
daf2e9956361353cf9a2e05a3546c113391375dd
SHA256
cb5de323deb08e0b5cf2da3d71e2fd56bfc1923b68f2c706608c52fb0d9111ec
SHA512
74eb9c48a5b6efd5a64ecf7d9cdc18e940033fe67cb69f4401edc88764bce1c5774506d20c8ae145156ef5ce285369f7cc1bd80f247300f7b5906da53e498c60
SSDEEP
3072:s5e0MxIXiJepV8YV0MXuVOaTkPybUFcyC+sEQqZ2242hBLo1WZQO:sWxIZp0MXufTPAGyC+FQoUIQO
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\Project\ADM\VOA\Release\ZPackManager.pdb
GetCurrentProcess
Process32First
WaitForSingleObject
OpenProcess
GetExitCodeProcess
TerminateProcess
GetSystemDirectoryA
MultiByteToWideChar
lstrlenW
FindFirstFileA
GetProcAddress
CopyFileA
FindClose
LoadLibraryA
Process32Next
GetModuleFileNameA
FindNextFileA
CreateToolhelp32Snapshot
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
SetUnhandledExceptionFilter
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetFileAttributesA
RemoveDirectoryA
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
FlushFileBuffers
ReadFile
SetEndOfFile
SetFilePointer
FreeLibrary
lstrlenA
CreateFileA
LockResource
SetLastError
GetLastError
SizeofResource
Sleep
WideCharToMultiByte
GetTickCount
LoadResource
FindResourceW
DeleteFileA
FindResourceExW
GetConsoleMode
GetConsoleCP
SetStdHandle
RtlUnwind
QueryPerformanceCounter
GetEnvironmentStringsW
CreateDirectoryA
FreeEnvironmentStringsW
LoadLibraryW
LCMapStringW
GetStringTypeW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetTimeFormatA
GetDateFormatA
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetFileType
CreateFileW
WriteFile
GetStdHandle
GetModuleFileNameW
SetHandleCount
GetStartupInfoW
GetTimeZoneInformation
GetTopWindow
SetActiveWindow
GetWindowRect
GetClassNameA
GetWindow
SetForegroundWindow
EnumChildWindows
RegisterWindowMessageA
SendMessageTimeoutA
SetWindowPos
SetFocus
ShowWindow
ControlService
OpenSCManagerA
QueryServiceStatus
RegOpenKeyExA
RegCreateKeyExA
StartServiceA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
DeleteService
CloseServiceHandle
OpenServiceA
RegCloseKey
CoUninitialize
CoInitialize
CoCreateInstance
ShellExecuteExA
SysFreeString
VariantInit
SysAllocStringLen
SysAllocString
timeBeginPeriod
timeGetTime
InternetCloseHandle
InternetOpenUrlA
InternetQueryDataAvailable
InternetReadFile
InternetOpenA
HttpQueryInfoA
UuidCreateSequential
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ