Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
81b364166eb331f8f9f940c0b9c86c53_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
81b364166eb331f8f9f940c0b9c86c53_JaffaCakes118.dll
Resource
win10v2004-20240426-en
Target
81b364166eb331f8f9f940c0b9c86c53_JaffaCakes118
Size
364KB
MD5
81b364166eb331f8f9f940c0b9c86c53
SHA1
6c8f70c026c7e84a76aa82c9dce40e143ec56162
SHA256
7e105552aebf7277840032782bc9d67b7c5e353beee041fc2c8598b3ea74cada
SHA512
d29438eb38e7eaf8d3f3bd2c3a2b5148b56c85185cc2be2b57ac59725f38b451bdbf02d7479b7f298d6efec5d4dcd5bd49c0d57a73fe88d5cf34f3a44240bcfa
SSDEEP
6144:5LjPM8O6atB1TZ5zLmPykTqtT8tZECWvAYtv8TBz4kqckHU:VjPM8O6azlZ5HmPcyE3vntv8TBB3k0
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\projects\projectsJ\nfsdk2\bin\release\win32\NtWinSecService.pdb
ReadFile
WriteFile
GetFileSize
SetEndOfFile
GetTempPathW
GetTempFileNameW
OpenProcess
InterlockedIncrement
SetFilePointer
CreateDirectoryW
LoadLibraryA
GetProcAddress
FreeLibrary
ProcessIdToSessionId
GetTickCount
CreateFileW
CreateMutexA
ReleaseMutex
LeaveCriticalSection
GetLastError
EnterCriticalSection
SetEvent
DeleteCriticalSection
lstrlenA
ResetEvent
InitializeCriticalSection
DeleteFileW
CreateEventA
WaitForMultipleObjects
ExpandEnvironmentStringsW
CloseHandle
WaitForSingleObject
CreateProcessW
FindClose
FindNextFileW
InterlockedDecrement
FindFirstFileW
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetStdHandle
FlushFileBuffers
LCMapStringW
LCMapStringA
HeapSize
Sleep
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
GetStartupInfoA
GetFileType
SetHandleCount
RtlUnwind
RaiseException
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
ExitProcess
GetModuleHandleA
HeapCreate
HeapDestroy
VirtualAlloc
VirtualFree
GetVersionExA
GetCommandLineA
HeapReAlloc
CreateThread
GetCurrentThreadId
ExitThread
GetProcessHeap
GetSystemTimeAsFileTime
MultiByteToWideChar
IsDebuggerPresent
GetOEMCP
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
HeapAlloc
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
OpenProcessToken
LookupAccountSidA
LookupAccountSidW
DuplicateTokenEx
ImpersonateLoggedOnUser
RevertToSelf
GetTokenInformation
SysAllocString
VariantClear
SysFreeString
CertCloseStore
CertGetCertificateChain
CertAddEncodedCertificateToStore
CertOpenStore
CertVerifyCertificateChainPolicy
CertFreeCertificateChain
CertOpenSystemStoreA
CertEnumCertificatesInStore
CertFindCertificateInStore
CertAddCertificateContextToStore
CertFreeCertificateContext
PFXExportCertStoreEx
ord48
ord86
ord116
ord110
ord82
ord83
ord75
ord112
ord12
ord22
ord28
ord265
ord155
ord94
ord385
ord8
ord43
ord78
ord58
ord61
ord35
ord96
ord166
ord84
ord6
ord243
ord284
ord370
ord45
ord90
ord391
ord108
ord359
ord31
ord242
ord74
ord183
ord60
ord129
ord648
ord657
ord579
ord578
ord566
ord2442
ord1958
ord1654
ord1653
ord3024
ord664
ord3171
ord2186
ord3106
ord283
ord485
ord279
ord673
ord670
ord629
ord188
ord656
ord2411
ord1804
ord573
ord1912
ord672
ord197
ord669
ord668
ord585
ord181
ord624
ord910
ord658
ord1206
ord246
ord667
ord364
ord2604
ord674
ord3164
ord224
ord3315
ord3048
ord109
ord1308
ord1291
ord3020
ord170
ord3173
ord227
ord581
ord653
ord2291
ord3205
ord2639
ord2684
ord2746
ord909
ord1299
ord444
ord1318
ord2734
ord1317
ord2672
ord58
ord164
ord2239
ord150
ord649
ord541
ord633
ord1177
ord1508
ord905
ord626
ord333
ord639
ord851
ord2838
ord857
ord2971
ord363
ord2713
ord316
ord2966
ord4701
ord298
ord921
ord281
ord254
ord641
ord66
ord89
ord52
ord421
ord95
ord78
ord754
WSAStartup
WSACleanup
ntohs
ntohl
htons
WSAAddressToStringA
?PFObject_create@NtWinSecService@@YAPAVPFObject@1@HH@Z
?pf_addFilter@NtWinSecService@@YAH_KW4_PF_FilterType@1@KW4_PF_OpTarget@1@1@Z
?pf_canDisableFiltering@NtWinSecService@@YAH_K@Z
?pf_deleteFilter@NtWinSecService@@YAH_KW4_PF_FilterType@1@@Z
?pf_free@NtWinSecService@@YAXXZ
?pf_getFilterCount@NtWinSecService@@YAH_K@Z
?pf_getNFEventHandler@NtWinSecService@@YAPAVNF_EventHandler@npflt@@XZ
?pf_getProcessOwnerA@NtWinSecService@@YAHKPADH@Z
?pf_getProcessOwnerW@NtWinSecService@@YAHKPA_WH@Z
?pf_init@NtWinSecService@@YAHPAVPFEvents@1@PB_W@Z
?pf_isFilterActive@NtWinSecService@@YAH_KW4_PF_FilterType@1@@Z
?pf_postObject@NtWinSecService@@YAH_KPAVPFObject@1@@Z
?pf_setRootSSLCertImportFlags@NtWinSecService@@YAXK@Z
?pf_setRootSSLCertSubject@NtWinSecService@@YAXPBD@Z
?pf_unzipStream@NtWinSecService@@YAHPAVPFStream@1@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ