Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8bf403152d79ac75f5e3388be1fcddbd_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8bf403152d79ac75f5e3388be1fcddbd_JaffaCakes118.dll
Resource
win10v2004-20240426-en
Target
8bf403152d79ac75f5e3388be1fcddbd_JaffaCakes118
Size
1.8MB
MD5
8bf403152d79ac75f5e3388be1fcddbd
SHA1
db50d8b2f01919c591cc61ee57a437ea7a352508
SHA256
7595c1888f316cc1a12ff50a0b6e74a15ba4fb4772c567d005722d0d0e00d5fa
SHA512
18f6814df2a4d9e12e035b835147cb9e22282512fe5a37e605227e840dd565978ac006457f5f5d5e99384bdb6722ff4f3be500a756095aa58005b15f7e34f318
SSDEEP
49152:gwKkhgxIUNXH3OCd8wPc24TaidQTkMUE0:gwKkhydMV
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
C:\vmagent_new\bin\joblist\378635\out\Release\safemon64.pdb
FindResourceA
LoadResource
SizeofResource
IsDBCSLeadByte
LoadLibraryExA
GetCommandLineW
GetComputerNameW
GetTempPathW
CreateDirectoryA
SetEndOfFile
VirtualQuery
IsDebuggerPresent
GetSystemDirectoryA
lstrcpyA
GetModuleFileNameW
GetProcessId
GetThreadId
GetThreadContext
MapViewOfFile
UnmapViewOfFile
QueryFullProcessImageNameA
DuplicateHandle
IsBadStringPtrW
LoadLibraryW
VirtualQueryEx
QueryDosDeviceW
GetFileSizeEx
GetPrivateProfileSectionA
CreateEventA
SetEvent
WaitForMultipleObjects
VirtualFree
VirtualAlloc
lstrcpynW
lstrcmpA
FreeResource
GlobalAlloc
GlobalLock
LockResource
GlobalUnlock
MulDiv
lstrcmpW
ResetEvent
OpenFileMappingA
GetProcessHeap
HeapFree
HeapAlloc
GlobalSize
CreateEventW
CreateFileW
GetTickCount
SetLastError
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
lstrcmpiW
CreateThread
RaiseException
lstrcmpiA
WriteFile
GetFileSize
ReadFile
CreateFileA
GetPrivateProfileIntA
GetLastError
Thread32First
SetThreadContext
GetVersionExW
GetPrivateProfileIntW
IsBadWritePtr
ResumeThread
SuspendThread
GetThreadPriority
VirtualProtectEx
SetThreadPriority
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
GetStartupInfoA
GetFileType
SetHandleCount
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
IsValidCodePage
GetOEMCP
GetACP
HeapDestroy
HeapCreate
HeapSetInformation
GetStdHandle
ExitProcess
HeapSize
FlsAlloc
GetCurrentThread
FlsFree
FlsGetValue
DecodePointer
EncodePointer
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwindEx
RtlPcToFileHeader
GetCommandLineA
FlsSetValue
HeapReAlloc
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
ReleaseMutex
HeapWalk
HeapLock
GetStartupInfoW
VirtualProtect
WaitForSingleObject
CreateRemoteThread
OutputDebugStringW
GetModuleFileNameA
ReadProcessMemory
OpenProcess
GetSystemInfo
GetPrivateProfileStringA
SetFilePointer
GetVersionExA
LocalAlloc
LoadLibraryA
FreeLibrary
Sleep
GetSystemDirectoryW
LocalFree
GetLongPathNameW
CreateToolhelp32Snapshot
SearchPathW
CloseHandle
GetCurrentProcessId
GetPrivateProfileStringW
WideCharToMultiByte
lstrlenW
lstrcpynA
OutputDebugStringA
DebugBreak
GetModuleHandleA
IsBadReadPtr
GetModuleHandleW
TlsGetValue
TlsFree
InitializeCriticalSection
TlsAlloc
TlsSetValue
GetProcAddress
MultiByteToWideChar
lstrlenA
EnterCriticalSection
LeaveCriticalSection
OpenThread
HeapUnlock
CreateMutexW
GetSystemTime
FormatMessageW
SetFilePointerEx
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetModuleHandleExW
DeviceIoControl
InterlockedPopEntrySList
InterlockedPushEntrySList
DeleteCriticalSection
Thread32Next
GetWindowLongA
InvalidateRect
SetTimer
IsWindowEnabled
RegisterClassExA
DestroyWindow
ShowWindow
KillTimer
SetWindowPos
SetWindowLongA
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
RegisterClassA
CreateWindowExA
MoveWindow
GetClientRect
GetParent
LoadStringA
CallWindowProcA
GetClassNameW
FindWindowA
EnumChildWindows
IsWindow
SetWindowLongPtrA
GetWindowRect
SetRect
LoadBitmapA
UnhookWinEvent
GetWindowLongPtrA
EndPaint
BeginPaint
LoadCursorA
SetWinEventHook
GetClassNameA
GetWindowTextA
CharNextA
GetClassInfoExA
SendMessageA
CreateWindowExW
RegisterClassW
PostQuitMessage
FindWindowW
RegisterWindowMessageA
GetWindowTextLengthA
SetWindowTextA
GetFocus
SetFocus
GetDlgItem
GetSysColor
RedrawWindow
CreateAcceleratorTableA
ClientToScreen
SetCapture
ReleaseCapture
FillRect
InvalidateRgn
DestroyAcceleratorTable
SendMessageTimeoutW
GetWindow
IsRectEmpty
IsWindowVisible
GetDesktopWindow
SetCursor
PtInRect
ScreenToClient
DrawTextW
InflateRect
SetWindowRgn
IsChild
EndDialog
DialogBoxParamA
PeekMessageA
UnregisterClassA
GetCursorPos
GetSystemMetrics
GetWindowTextW
FindWindowExW
PostMessageA
SendMessageTimeoutA
LoadImageA
wsprintfW
wsprintfA
ReleaseDC
GetDC
CombineRgn
CreatePolygonRgn
CreateRectRgn
CreateFontIndirectA
LineTo
MoveToEx
SetTextColor
GetStockObject
CreateDIBSection
SetStretchBltMode
CreatePen
GetDeviceCaps
BitBlt
CreateCompatibleBitmap
SetViewportOrgEx
ExtTextOutA
SetBkColor
StretchBlt
SetBkMode
DeleteDC
GetObjectA
SelectObject
CreateCompatibleDC
DeleteObject
CreateSolidBrush
ConvertStringSecurityDescriptorToSecurityDescriptorW
IsValidSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
InitializeSecurityDescriptor
SetSecurityInfo
GetSecurityDescriptorSacl
RegQueryValueExA
RegQueryValueExW
RegOpenKeyExW
ConvertSidToStringSidA
LookupAccountNameW
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyW
OpenProcessToken
RegEnumKeyExW
GetTokenInformation
ConvertSidToStringSidW
SHGetSpecialFolderPathA
ShellExecuteW
SHGetPathFromIDListW
CommandLineToArgvW
SHGetSpecialFolderPathW
SHGetSpecialFolderLocation
SHGetFolderPathW
CoCreateInstance
StringFromCLSID
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
GetHGlobalFromStream
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
OleUninitialize
CreateStreamOnHGlobal
StringFromGUID2
CoTaskMemRealloc
OleRun
GetErrorInfo
VariantClear
VariantInit
SysFreeString
DispCallFunc
SysStringLen
LoadTypeLi
VarUI4FromStr
LoadRegTypeLi
SysAllocString
SysStringByteLen
SysAllocStringByteLen
UnRegisterTypeLi
OleCreateFontIndirect
SysAllocStringLen
SHGetValueW
StrCmpNIA
PathFindFileNameA
PathRemoveFileSpecA
StrChrA
UrlGetPartA
PathGetArgsW
PathFindExtensionW
PathMatchSpecW
PathAppendA
StrCmpNW
PathUnquoteSpacesA
StrStrW
StrToIntExW
SHSetValueW
UrlGetPartW
SHSetValueA
SHDeleteKeyA
UrlUnescapeA
PathRemoveExtensionA
PathRemoveExtensionW
wnsprintfW
StrDupA
StrDupW
StrChrW
StrCmpW
PathFileExistsA
PathFileExistsW
PathAppendW
PathCombineW
StrStrIA
StrStrIW
StrCpyNW
StrCmpNIW
StrCmpIW
PathFindFileNameW
PathCombineA
StrTrimA
SHGetValueA
AccessibleObjectFromPoint
AccessibleObjectFromEvent
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
getpeername
ntohl
WSAGetLastError
ImageNtHeader
ImageDirectoryEntryToDataEx
ImageDirectoryEntryToData
GetModuleInformation
NetApiBufferFree
NetWkstaUserGetInfo
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IsTraystupidRealRunning
cJSON_AddArrayToObject
cJSON_AddBoolToObject
cJSON_AddFalseToObject
cJSON_AddItemReferenceToArray
cJSON_AddItemReferenceToObject
cJSON_AddItemToArray
cJSON_AddItemToObject
cJSON_AddItemToObjectCS
cJSON_AddNullToObject
cJSON_AddNumberToObject
cJSON_AddObjectToObject
cJSON_AddRawToObject
cJSON_AddStringToObject
cJSON_AddTrueToObject
cJSON_Compare
cJSON_CreateArray
cJSON_CreateArrayReference
cJSON_CreateBool
cJSON_CreateDoubleArray
cJSON_CreateFalse
cJSON_CreateFloatArray
cJSON_CreateIntArray
cJSON_CreateNull
cJSON_CreateNumber
cJSON_CreateObject
cJSON_CreateObjectReference
cJSON_CreateRaw
cJSON_CreateString
cJSON_CreateStringArray
cJSON_CreateStringReference
cJSON_CreateTrue
cJSON_Delete
cJSON_DeleteItemFromArray
cJSON_DeleteItemFromObject
cJSON_DeleteItemFromObjectCaseSensitive
cJSON_DetachItemFromArray
cJSON_DetachItemFromObject
cJSON_DetachItemFromObjectCaseSensitive
cJSON_DetachItemViaPointer
cJSON_Duplicate
cJSON_GetArrayItem
cJSON_GetArraySize
cJSON_GetErrorPtr
cJSON_GetObjectItem
cJSON_GetObjectItemCaseSensitive
cJSON_GetStringValue
cJSON_HasObjectItem
cJSON_InitHooks
cJSON_InsertItemInArray
cJSON_IsArray
cJSON_IsBool
cJSON_IsFalse
cJSON_IsInvalid
cJSON_IsNull
cJSON_IsNumber
cJSON_IsObject
cJSON_IsRaw
cJSON_IsString
cJSON_IsTrue
cJSON_Minify
cJSON_Parse
cJSON_ParseWithOpts
cJSON_Print
cJSON_PrintBuffered
cJSON_PrintPreallocated
cJSON_PrintUnformatted
cJSON_ReplaceItemInArray
cJSON_ReplaceItemInObject
cJSON_ReplaceItemInObjectCaseSensitive
cJSON_ReplaceItemViaPointer
cJSON_SetNumberHelper
cJSON_Version
cJSON_free
cJSON_malloc
safemon_115
safemoninit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ