Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
4b101cf23d77bd09108fc8d0fba12126_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b101cf23d77bd09108fc8d0fba12126_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
4b101cf23d77bd09108fc8d0fba12126_JaffaCakes118
Size
2.5MB
MD5
4b101cf23d77bd09108fc8d0fba12126
SHA1
4c13ad11caf3d71a34077522c9f5e6f7d0f59c32
SHA256
44a9919d39e3b160014e706e59cb9dda071f4ad0702ac03b9f7c9d83f5282c1e
SHA512
bef13eac5c05c138d79d0e446d75004f73de2a0f41c8bd0a723d74f14df240ecc944e8a195b1112d0d3583a3c42612c58e1c552959a343a72a24444e6dd287ba
SSDEEP
49152:kiW7yuv5frfCFiP8xEiZ19SebNfOEiueiOgAOHVWJulw:kiW7yuxfOs8JjpbZzUg4
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
E:\trunk\dllplugin\InstallerTool\bin\Win32\Release\pdb\FileInfo.pdb
DeleteCriticalSection
DeleteFileW
FreeLibrary
MoveFileExW
SetEvent
LoadLibraryW
Sleep
GetFileAttributesW
GetProcAddress
GlobalMemoryStatusEx
OpenEventW
CloseHandle
SetFileAttributesW
GetModuleFileNameW
GetDriveTypeW
lstrcpynW
lstrlenW
lstrcmpiW
GetShortPathNameW
GetTickCount
FreeResource
FindResourceW
LoadResource
SizeofResource
LockResource
WaitForSingleObject
OpenProcess
TerminateProcess
GetCurrentProcessId
GlobalAlloc
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
lstrcpyW
GetCommandLineW
GetLocalTime
LocalFree
GetFileSize
SetFilePointer
WriteFile
CreateFileW
GetACP
FindFirstFileW
GetLongPathNameW
GetModuleHandleW
GetVersionExW
GetSystemInfo
ResumeThread
GetCurrentProcess
TerminateThread
OpenThread
GetExitCodeThread
GetCurrentThreadId
SuspendThread
DecodePointer
LeaveCriticalSection
EnterCriticalSection
GetLogicalDriveStringsW
GetDiskFreeSpaceW
GetVolumeInformationW
SetEndOfFile
SetFileTime
ReadFile
QueryDosDeviceW
HeapAlloc
HeapFree
GetProcessHeap
FindClose
FindNextFileW
GetFullPathNameW
GetTempFileNameW
CreateDirectoryW
GetSystemDirectoryW
GetTempPathW
GetCurrentDirectoryW
MoveFileW
RemoveDirectoryW
GetWindowsDirectoryW
ResetEvent
CreateEventW
InterlockedExchangeAdd
SetLastError
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
GetEnvironmentVariableW
ExpandEnvironmentStringsW
LoadLibraryExW
FileTimeToSystemTime
DeviceIoControl
CreateProcessW
InterlockedDecrement
GetPrivateProfileStringW
lstrcatW
SetEnvironmentVariableA
FlushFileBuffers
WriteConsoleW
SetStdHandle
HeapReAlloc
GetLastError
RaiseException
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
SetFilePointerEx
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetStdHandle
HeapSize
AreFileApisANSI
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
ExitThread
CreateThread
IsDebuggerPresent
OutputDebugStringW
EncodePointer
GetStringTypeW
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetCommandLineA
wsprintfW
RegisterWindowMessageW
PostMessageW
FindWindowW
AdjustTokenPrivileges
DuplicateTokenEx
GetUserNameW
ord190
CommandLineToArgvW
SHGetSpecialFolderPathW
ord155
ShellExecuteW
SHChangeNotify
SHGetFolderPathW
CoInitializeSecurity
PropVariantClear
CoInitialize
CoUninitialize
CoCreateInstance
CoInitializeEx
VariantInit
VariantClear
SysAllocString
VariantChangeType
SysFreeString
SHStrDupW
StrCmpW
StrStrIW
StrCatW
PathAppendW
PathRemoveFileSpecW
PathFileExistsW
WTSFreeMemory
WTSQuerySessionInformationW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
CheckInstallTime
CheckSystemConfiguration
ClearAudioReg
CreateDownloadFolder
CreateLowIntegrityProcess
CreateScheduledTask
Delete2345ExplorerTargetShortCut
DeleteInstallFile
DeleteScheduledTask
EncodeJifenID
EncodeUnion
FindProc
FindProc2345Explorer
FindSubstring
Get2345ExplorerPath
GetCreateDesktopGuideCloudConfig
GetCurrentSystemTime
GetJifenInstallerParams
GetParentProcessName
GetRandomPromotionDllPath
GetRecommendPCSafeCloudConfig
GetSDKCloudConfig
GetUnionCustomInstallerParams
GetUnionNameInstallerParams
ImpersonateUser
Init
InitInstallStatusStatistic
InitStatService
InitializeRecommendPCSafe
InstallPCSafe
InstallRecommendPCSafeDll
InstallShield
IsWin10OrLater
KillProc
KillProc2345Explorer
PinToStartMenu
PinToTaskBar
PreProcessShortCut
RevertUser
SendInstallFeatureStat
SendOverwriteFeatureStat
SendStatInfo
SendUninstallFeatureStat
SendUpgradeFeatureStat
SetInstallCompleteEvent
SetInstallStep
ShieldUnlock
StartCloudConfigRequest
StopShield
TerminateCloudConfigRequest
UnInitStatService
UninitInstallStatusStatistic
UninitializeRecommendPCSafe
UninstallShield
UnpinFromStartMenu
UnpinFromTaskBar
WriteInstallData
WriteLog
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ