Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
179bbb7a38b687dc1b18991a25b26a3d_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
179bbb7a38b687dc1b18991a25b26a3d_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
179bbb7a38b687dc1b18991a25b26a3d_JaffaCakes118
Size
7.7MB
MD5
179bbb7a38b687dc1b18991a25b26a3d
SHA1
8a0b4e461e33a68b1baf13b6eb3d726901e77470
SHA256
db4a628f6def087c8c2fa2486881e0cd73b99f33839db5e7de9a545030ab9c35
SHA512
0455170ee4399538b42a52059213d6fd10462007bd4e2bc3d034b6ab177aeb7e7e0fb8172083ab28ab5954761bd16b5fa4a624ee140b438e2e54db0b1f1a8271
SSDEEP
98304:Eq7CdqdcsAKd9dvS4ITTr+JW95WvLq+9pRTyAl:NX5S4IDYjLR+k
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenW
CreateThread
ResumeThread
SuspendThread
ReleaseMutex
WaitForSingleObject
Sleep
GetModuleFileNameA
GetCommandLineA
MapViewOfFile
CreateFileMappingA
GetCurrentProcessId
LoadLibraryA
GetModuleHandleA
GetProcAddress
GetModuleHandleW
MultiByteToWideChar
GetModuleFileNameW
VirtualAlloc
GetVersionExA
VirtualFree
GetCurrentProcess
UnmapViewOfFile
GetFileSize
GetLastError
CreateFileA
GetSystemDirectoryA
IsBadReadPtr
GetExitCodeThread
OpenThread
DeleteTimerQueueTimer
InterlockedExchange
WideCharToMultiByte
CreateTimerQueueTimer
InterlockedExchangeAdd
Module32Next
Module32First
CreateToolhelp32Snapshot
Process32Next
OpenProcess
Process32First
Thread32Next
Thread32First
GetSystemInfo
CreateMutexW
OpenMutexW
CreateFileMappingW
OpenFileMappingW
ReadFile
GetEnvironmentVariableA
GetVolumeInformationA
SystemTimeToFileTime
SetLastError
GetComputerNameW
lstrcmpW
InterlockedDecrement
OutputDebugStringA
CloseHandle
TerminateThread
CreateMutexA
CreateEventA
SetEvent
GetTickCount
EnterCriticalSection
LocalFree
lstrlenA
FreeLibrary
GetWindowsDirectoryA
GetTempPathA
FindFirstFileA
FindClose
LeaveCriticalSection
DeleteCriticalSection
GetCurrentThreadId
InitializeCriticalSection
ExitProcess
IsBadWritePtr
SetThreadPriority
SearchPathA
SetFilePointer
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
GetProcessTimes
WriteFile
QueryDosDeviceA
GetLogicalDriveStringsA
DeviceIoControl
select
connect
ioctlsocket
__WSAFDIsSet
socket
closesocket
shutdown
recv
send
getsockname
sendto
htons
WSAGetLastError
ntohs
ntohl
setsockopt
WSAStartup
gethostname
gethostbyname
inet_ntoa
inet_addr
WSACleanup
htonl
timeGetTime
PathAddBackslashA
PathAppendA
PathIsRelativeA
PathRemoveFileSpecA
PathCombineA
GetProcessMemoryInfo
SHGetSpecialFolderPathA
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?getline@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADHD@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
_wcsicmp
wcslen
wcsrchr
localtime
fclose
fread
fopen
sprintf
ftell
fseek
rand
_snwprintf
islower
isdigit
isxdigit
strpbrk
strspn
isspace
strtol
mktime
malloc
free
_mbsnbicmp
wcsncpy
wcscmp
?_set_se_translator@@YAP6AXIPAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z
_CxxThrowException
strncat
strstr
fgets
strncmp
strlen
memcmp
memcpy
memset
_mbsstr
_mbsrchr
_assert
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
_mbschr
wcsstr
_strnicmp
__dllonexit
_onexit
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
_snprintf
strrchr
strtok
atol
_except_handler3
time
strncpy
_vsnprintf
_mbslwr
_mbsnbcat
_mbsnbcpy
memmove
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
_stricmp
_memicmp
_strlwr
strchr
strtod
atof
toupper
mbstowcs
setlocale
wcstombs
tolower
_pctype
_isctype
__mb_cur_max
fprintf
vfprintf
srand
TranslateMessage
DispatchMessageA
IsWindow
SendMessageA
PeekMessageA
CreateWindowExA
SetTimer
KillTimer
EnumDisplayDevicesA
DestroyWindow
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegQueryValueExW
RegConnectRegistryW
CloseEventLog
ReadEventLogW
GetOldestEventLogRecord
OpenEventLogW
LookupPrivilegeValueA
CoInitializeEx
CoCreateGuid
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitializeSecurity
SetErrorInfo
GetErrorInfo
CreateErrorInfo
VariantChangeType
SysFreeString
SysAllocString
VariantClear
VariantInit
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Netbios
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
CreateObj
DllEntry
DllEntry1
DllEntry2
DllEntry3
DllEntry4
DllEntry5
DllEntry6
DllEntry7
DllEntry8
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ