Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
5d41c2f6d37dcd1f98d9815784b8d453_JaffaCakes118.dll
Resource
win7-20240221-en
Target
5d41c2f6d37dcd1f98d9815784b8d453_JaffaCakes118
Size
4.3MB
MD5
5d41c2f6d37dcd1f98d9815784b8d453
SHA1
3f84c49d5422b20a470689b926920e46c8f1a43d
SHA256
9f3ff89df28093550bafa842b306107b32848ee42f14576fcf925eaac211ec34
SHA512
5cece858e1dca21c5f3edcbac2c400356a03e11d781ccc382e99741dceeae8b177a03f225bc143e6921e021fbb5a0bddf6254fe04cf7eca0c9d4a55521225e23
SSDEEP
49152:q/fTiECzT96Se3gKlwq9cFOqFzDZAERZjp364QdxR:r4Se3gKluOqFzDZAMpc
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\solution\Release\kdfinj.pdb
ImmGetConversionStatus
ImmGetContext
ImmReleaseContext
ImmSetConversionStatus
ImmGetDefaultIMEWnd
PathRemoveBackslashW
PathAddBackslashW
PathRemoveFileSpecW
PathIsRelativeW
PathFileExistsW
PathAppendW
WinVerifyTrust
LeaveCriticalSection
WriteFile
GetCurrentProcess
GetModuleFileNameW
GetLocalTime
CreateDirectoryW
GetVersionExA
Sleep
DeviceIoControl
OpenMutexA
GetSystemDefaultLangID
GetUserDefaultLangID
GetModuleFileNameA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
TerminateProcess
GetTickCount
GetFullPathNameW
CopyFileW
LoadResource
LockResource
SizeofResource
GetFileAttributesW
SetFileAttributesW
FindResourceA
GetWindowsDirectoryW
DeleteFileW
GetSystemWow64DirectoryW
CreateProcessW
MoveFileW
Process32FirstW
Process32NextW
CreateMutexA
GetSystemDirectoryA
LocalFree
GetModuleHandleW
CreateFileMappingA
MapViewOfFile
EnterCriticalSection
WideCharToMultiByte
SystemTimeToFileTime
GetHandleInformation
GetSystemInfo
FlushFileBuffers
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
HeapSize
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
LoadLibraryExA
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
RtlUnwind
RaiseException
GetCommandLineA
HeapAlloc
HeapFree
GetCPInfo
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
InterlockedExchange
MultiByteToWideChar
DeleteCriticalSection
SetFilePointer
CreateFileW
OutputDebugStringW
IsDebuggerPresent
SetLastError
LoadLibraryA
CloseHandle
CreateFileA
GetModuleHandleA
GetLastError
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
FreeLibrary
ReleaseMutex
WaitForSingleObject
GetCurrentThreadId
GetCurrentProcessId
DeactivateActCtx
ActivateActCtx
CreateActCtxA
GetModuleHandleExA
ReleaseActCtx
GetProcessHeap
IsValidCodePage
GetACP
GetOEMCP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapReAlloc
LoadLibraryExW
ReadConsoleW
SetStdHandle
WriteConsoleW
SetEndOfFile
UnmapViewOfFile
DecodePointer
EncodePointer
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
SetWindowLongA
SetWindowLongW
IsWindowUnicode
GetWindowTextW
DefWindowProcA
RegisterClassA
LoadIconA
LoadCursorA
IsWindow
SetTimer
KillTimer
SetWindowsHookExA
ToAsciiEx
GetActiveWindow
ToAscii
GetKeyboardState
GetClassNameA
GetKeyState
MapVirtualKeyA
GetAsyncKeyState
GetWindowLongA
GetFocus
GetKeyboardLayout
SendMessageA
CallNextHookEx
GetWindowThreadProcessId
GetClassNameW
GetForegroundWindow
MessageBoxW
PostMessageA
FindWindowA
GetParent
CallWindowProcA
ToUnicodeEx
wsprintfA
SendMessageTimeoutA
SetWindowPos
UnhookWindowsHookEx
CreateWindowExA
GetStockObject
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegCloseKey
GetCurrentHwProfileA
CheckTokenMembership
CreateWellKnownSid
DuplicateToken
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
GetSecurityDescriptorSacl
DeleteService
ControlService
StartServiceA
ChangeServiceConfigA
OpenServiceA
CreateServiceA
OpenSCManagerA
CloseServiceHandle
ShellExecuteW
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
ShellExecuteA
SHGetFolderPathW
SHGetFolderPathA
ShellExecuteExW
kdfAutoStart
kdfAutoStartClean
kdfAutoStartCleanB
kdfAutoStartCleanD
kdfAutoStartCleanN
kdfAutoStartCleanTID
kdfAutoStartV
kdfAutoStart_PIDTID
kdfAutoStart_h
kdfCkeckKeylogger
kdfExProtect
kdfGetVersion
kdfMultiSetFocus
kdfSelfCheckIntegrity
kdfSetFlashE2E_INJ
kdfSetFocusIn
kdfSetFocusOut
kdfSetImageDir
kdfSetSoftCertInit
kdfSoftCertGetPwValue
kdfSoftCertGetlenght
kdfWebBrowserContextMenu
kdfWebBrowserHandleAdd
kdfWebBrowserHandleRemove
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ