Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
69db2deedc01f06b76dd8a5646e53de3_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
69db2deedc01f06b76dd8a5646e53de3_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
69db2deedc01f06b76dd8a5646e53de3_JaffaCakes118
Size
136KB
MD5
69db2deedc01f06b76dd8a5646e53de3
SHA1
65b989c76354283e15bf718863d5f35ef2a3ee4d
SHA256
6947fc58fc0713b3741be9306995b97359f65976de00682dc563e8083ea98fbb
SHA512
a231b0d95c5f5b6421a44f5ad432bd3773ab424066e8729ef2fa3068d528a918c6c2c7b524e1ed9b5ed90c63cc212292f912e0b3d16076223624948da6e6e87f
SSDEEP
1536:4E9glIhEXAwCTAJpWRKq6Y2uE577IhknnNBnmO1Yyt+Sob3kfXBIaov98STFON3O:t+eAE6YgBDnGytVobOXBBYxEBQ3GO
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
E:\BFWORKSPACE\workspace\暴风主干官网\trunk2\bin\Release\BFDesktopIcon.pdb
GdipDeleteFont
GdipLoadImageFromFileICM
GdiplusStartup
GdiplusShutdown
GdipLoadImageFromStream
GdipDrawString
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDisposeImage
GdipSaveGraphics
GdipDrawImageRect
GdipDeleteGraphics
GdipCreateFromHDC
GdipGetImageWidth
GdipGetImageHeight
GdipCloneImage
GdipAlloc
GdipFree
AlphaBlend
HeapDestroy
HeapCreate
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetStartupInfoW
GetFileType
GetStdHandle
GetStringTypeW
lstrcpynA
lstrcpynW
InterlockedDecrement
lstrlenW
DebugBreak
OutputDebugStringW
lstrlenA
OpenFileMappingW
CloseHandle
GetCurrentProcess
FlushInstructionCache
GetVersionExW
LoadLibraryW
GetProcAddress
FreeLibrary
GetModuleHandleW
WaitForSingleObject
GetModuleFileNameW
GetCurrentProcessId
lstrcmpiW
GetTickCount
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
OpenMutexW
Sleep
CreateProcessW
GetProcessHeap
HeapAlloc
ReadFile
SetFilePointer
VirtualAlloc
QueryPerformanceCounter
FindResourceW
SizeofResource
LockResource
LoadResource
GlobalAlloc
GlobalLock
GlobalUnlock
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCommandLineA
DecodePointer
EncodePointer
CreateThread
GetCurrentThreadId
ExitProcess
ExitThread
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
InterlockedPopEntrySList
VirtualFree
IsProcessorFeaturePresent
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetSystemTimeAsFileTime
HeapReAlloc
WriteFile
HeapSize
SetHandleCount
RtlUnwind
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
LCMapStringW
SetStdHandle
WriteConsoleW
CreateFileW
GetFileSize
FlushFileBuffers
FillRect
CopyRect
LoadStringW
WaitForInputIdle
PostMessageW
ClientToScreen
PtInRect
FindWindowExW
GetShellWindow
GetWindowThreadProcessId
SetTimer
GetWindow
GetWindowDC
FindWindowW
SystemParametersInfoW
GetParent
ReleaseDC
GetDC
GetClientRect
GetDesktopWindow
GetWindowRect
CallWindowProcW
DefWindowProcW
SetWindowLongW
GetWindowLongW
UpdateWindow
InvalidateRect
RegisterWindowMessageW
KillTimer
CharNextW
ScreenToClient
GetCursorPos
SendMessageW
SendMessageTimeoutW
GetPixel
BitBlt
CreateCompatibleBitmap
SetPixel
CreateCompatibleDC
DeleteObject
SelectObject
GetStockObject
DeleteDC
CreateDIBSection
CreateBrushIndirect
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
SHChangeNotify
SHFileOperationW
SHGetSpecialFolderPathW
CreateStreamOnHGlobal
PathFileExistsW
PathRemoveFileSpecW
PathAppendW
SHSetValueW
SHGetValueW
ImageList_GetImageInfo
ImageList_GetImageCount
ImageList_Replace
EnableShellHelper
GetState
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ