Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
7c924df4b4557cc716b2999ec74fc20d_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c924df4b4557cc716b2999ec74fc20d_JaffaCakes118.dll
Resource
win10v2004-20240426-en
Target
7c924df4b4557cc716b2999ec74fc20d_JaffaCakes118
Size
12.2MB
MD5
7c924df4b4557cc716b2999ec74fc20d
SHA1
5d0fc3023058aadd3d24a572fe07fe7cf4d162e0
SHA256
417ca71456a3e4536f8b8d5ed9979aedbfe25bcb07609b2eb5010598b7611d32
SHA512
c506d4fbac6a4da81f902ac691440a5c995ad072b4230da71ee7d8f976e50aca2c091c4c038c0963ded9852d60ba519f486022e0c1723be3ef7d456173fbc650
SSDEEP
196608:CYZqXD22nKRy7WuM1bxTyjqSINZ4QAu/sTqlJWTok+bCdc2m6n:CYZqX6RNf1J45uOdX+C
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
E:\.jenkins\workspace\tenprotect3-trunk-alternative\output\Release\TP3Shell.pdb
SHGetValueA
PathIsDirectoryA
PathFileExistsA
PathCombineW
PathCombineA
StrStrIW
SHDeleteKeyA
SHSetValueA
CryptCATAdminReleaseCatalogContext
CryptCATAdminAcquireContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminReleaseContext
CryptCATCatalogInfoFromContext
CryptCATAdminEnumCatalogFromHash
WinVerifyTrust
GetLastError
GetProcessId
GetModuleFileNameA
GetCurrentProcessId
GetTickCount
LeaveCriticalSection
SetThreadPriority
InterlockedExchange
EnterCriticalSection
OpenThread
GetThreadPriority
VirtualQuery
GlobalAddAtomA
GlobalFindAtomA
Process32Next
GetModuleHandleA
GetProcAddress
WriteProcessMemory
CreateFileA
GetFileSize
SetFilePointer
MapViewOfFile
UnmapViewOfFile
FreeLibrary
HeapAlloc
HeapFree
Process32First
GetWindowsDirectoryA
ReadProcessMemory
HeapCreate
ReadFile
FindFirstFileA
HeapSize
FindClose
LoadLibraryA
OpenMutexA
CreateFileMappingA
OpenEventA
FindNextFileA
CreateToolhelp32Snapshot
GetFileTime
WideCharToMultiByte
GlobalMemoryStatusEx
DeviceIoControl
GetSystemInfo
GetVersionExA
SetEvent
CreateEventA
CreateThread
Process32FirstW
Process32NextW
LoadLibraryExW
GetCurrentThread
LoadLibraryW
ExitThread
LoadLibraryExA
GetCurrentThreadId
IsBadReadPtr
ExitProcess
VirtualFree
Thread32First
GetFileAttributesA
IsBadWritePtr
Thread32Next
GetSystemDirectoryA
VirtualAlloc
VirtualProtect
GetCurrentDirectoryA
OpenFileMappingA
WriteFile
GetStdHandle
CloseHandle
GetProcessHeap
MultiByteToWideChar
lstrcmpA
SystemTimeToFileTime
FileTimeToSystemTime
LocalAlloc
FileTimeToLocalFileTime
LocalFree
SetLastError
lstrcpynA
MulDiv
Sleep
WaitForSingleObject
ExpandEnvironmentStringsA
InterlockedExchangeAdd
SearchPathW
OutputDebugStringA
GetModuleFileNameW
GetSystemTimes
TerminateThread
FindResourceA
ActivateActCtx
DeactivateActCtx
ReleaseActCtx
CreateMutexA
ReleaseMutex
QueryPerformanceCounter
IsDebuggerPresent
IsWow64Process
CreateMutexW
GetSystemDirectoryW
GetFileAttributesW
CreateFileW
GetTempPathA
VirtualAllocEx
GetModuleHandleW
ResetEvent
CreateEventW
FindFirstFileW
ResumeThread
SuspendThread
FlushInstructionCache
InterlockedCompareExchange
SetThreadContext
GetThreadContext
GetDriveTypeA
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
CreateProcessA
DuplicateHandle
MoveFileA
DeleteCriticalSection
SetEnvironmentVariableA
WaitForMultipleObjects
GetEnvironmentVariableA
TerminateProcess
OpenProcess
InitializeCriticalSection
GetCurrentProcess
CreateProcessW
GetCommandLineW
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
FormatMessageA
InterlockedIncrement
InterlockedDecrement
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
GetTimeFormatA
GetDateFormatA
RaiseException
GetExitCodeProcess
CreatePipe
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetLocalTime
QueryPerformanceFrequency
LCMapStringA
LCMapStringW
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetACP
GetOEMCP
IsValidCodePage
GetFileType
SetHandleCount
GetFullPathNameA
HeapDestroy
EnumDisplayDevicesA
MessageBoxA
wsprintfA
FindWindowExA
SendMessageTimeoutA
EnumChildWindows
EnumWindows
GetWindowLongA
GetWindowThreadProcessId
ShowWindow
GetWindowTextA
GetWindowTextLengthA
GetForegroundWindow
GetDlgItem
RegQueryValueExA
LookupPrivilegeValueA
OpenSCManagerA
ChangeServiceConfigW
RegCreateKeyExA
StartServiceA
OpenServiceW
CloseServiceHandle
CreateServiceW
AdjustTokenPrivileges
RegCloseKey
RegEnumValueA
CryptGenRandom
RegOpenKeyExA
CryptAcquireContextA
CryptReleaseContext
OpenProcessToken
SHGetSpecialFolderPathA
CommandLineToArgvW
SHGetFolderPathA
ShellExecuteA
RtlFreeHeap
RtlAnsiStringToUnicodeString
NtQueryInformationThread
NtGetContextThread
LdrLoadDll
NtQueryInformationProcess
NtFlushInstructionCache
RtlInitUnicodeString
NtProtectVirtualMemory
RtlEqualUnicodeString
LdrUnlockLoaderLock
RtlHashUnicodeString
RtlAllocateHeap
LdrLockLoaderLock
RtlUpcaseUnicodeChar
NtWriteVirtualMemory
RtlInitAnsiString
RtlUnwind
GetAdaptersInfo
GetModuleFileNameExW
GetProcessImageFileNameA
GetModuleFileNameExA
GetDeviceDriverBaseNameA
EnumDeviceDrivers
EnumProcessModules
Netbios
inet_addr
select
WSAStartup
htons
setsockopt
recv
bind
socket
closesocket
gethostbyname
send
getsockopt
connect
ioctlsocket
htonl
ntohl
sendto
WSAGetLastError
CryptDecodeObject
CryptQueryObject
CryptMsgGetParam
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ