Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
98a0e586cabf69279bb04c22bd9538a7_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
98a0e586cabf69279bb04c22bd9538a7_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
98a0e586cabf69279bb04c22bd9538a7_JaffaCakes118
Size
884KB
MD5
98a0e586cabf69279bb04c22bd9538a7
SHA1
a17a2cf8ff4362cf95aa16cbbb70c340cbc1a94c
SHA256
24fb4b1d3d1556d36ea59b56cc0a00608586a28f13afb7d89982ba4837ead801
SHA512
9ac5b5fe63e3d81e964cb072cc17f35b8eef0e0b046bd27d5021c4b69f375ae99c91684f58ea2354d1596da7282467e6aa0940750c859d276d19c62a191e3fd3
SSDEEP
12288:juYFDgrL9TcounzMjq9TCCDsaJLjeNW8NOd+Jq44dBcbf:3FkrL9TcounzMjq9JDsaJmUd+JsdBC
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\vmagent_new\bin\joblist\218284\out\Release\360SySRePairUI.pdb
GlobalFree
DeleteCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
RaiseException
SizeofResource
HeapFree
EnterCriticalSection
GetModuleFileNameW
LeaveCriticalSection
GetCurrentThreadId
HeapSize
MultiByteToWideChar
HeapReAlloc
LoadResource
FindResourceW
HeapAlloc
HeapDestroy
GetProcessHeap
FreeLibrary
lstrcmpiW
LoadLibraryExW
LoadLibraryW
CreateMutexW
CloseHandle
OpenMutexW
LockResource
FindResourceExW
VerifyVersionInfoW
VerSetConditionMask
GetSystemInfo
GetModuleHandleA
GetWindowsDirectoryW
GetFullPathNameW
CreateThread
WaitForSingleObject
WideCharToMultiByte
InitializeCriticalSection
Sleep
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
ReadFile
OpenProcess
ReadProcessMemory
CreateToolhelp32Snapshot
Process32FirstW
GetCurrentProcessId
TerminateProcess
Process32NextW
GetCurrentProcess
SetLastError
CreateFileW
SetFilePointer
SetCurrentDirectoryW
FindClose
FindFirstFileW
lstrlenW
DeleteFileW
FindNextFileW
GlobalAlloc
CreateProcessW
GetStartupInfoW
GetVersion
GetVersionExW
GetFileAttributesExW
QueryPerformanceFrequency
QueryPerformanceCounter
GetTickCount
GetSystemDirectoryW
GetDiskFreeSpaceExW
CreateEventW
ResetEvent
SetEvent
OpenEventW
WaitForMultipleObjects
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
CreateRemoteThread
Module32FirstW
Module32NextW
LocalFree
LocalAlloc
WriteFile
GetFileSize
GetExitCodeProcess
FreeResource
GetLocalTime
SetFileAttributesW
FlushFileBuffers
GetSystemDefaultUILanguage
lstrlenA
lstrcmpiA
MoveFileExW
ExpandEnvironmentStringsW
MoveFileW
GetTempPathW
ProcessIdToSessionId
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
lstrcmpW
FlushInstructionCache
SystemTimeToFileTime
GlobalLock
GlobalUnlock
ReleaseMutex
SetPriorityClass
CreateFileA
SetThreadExecutionState
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
InterlockedExchange
GetProcAddress
DeviceIoControl
GetModuleHandleW
RtlUnwind
OutputDebugStringA
LocalFileTimeToFileTime
SetFilePointerEx
GetFileSizeEx
OpenThread
HeapUnlock
TlsFree
TlsGetValue
TlsAlloc
HeapWalk
HeapLock
TlsSetValue
GetSystemTime
FormatMessageW
VirtualFree
VirtualAlloc
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
DecodePointer
EncodePointer
OutputDebugStringW
LoadLibraryExA
VirtualQuery
VirtualProtect
InterlockedCompareExchange
GetOpenFileNameW
GetSaveFileNameW
isalnum
isspace
iswspace
srand
rand
wcsncat
wcsncpy
_waccess
??_U@YAPAXI@Z
wcstoul
_wfopen
feof
fgets
??0exception@@QAE@ABV0@@Z
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
isdigit
_wcsrev
wcsftime
wcsncmp
_localtime64
_lseeki64
___lc_codepage_func
_beginthreadex
_lock
_unlock
_amsg_exit
memcpy
memset
_iob
abort
?terminate@@YAXXZ
_CxxThrowException
__uncaught_exception
setlocale
__pctype_func
isupper
_wcsdup
___lc_handle_func
__crtLCMapStringA
islower
realloc
localeconv
_snwprintf
wcstok
strerror
swscanf
__dllonexit
_onexit
??1type_info@@UAE@XZ
_XcptFilter
_initterm
__RTDynamicCast
mbtowc
__mb_cur_max
isleadbyte
isxdigit
_snprintf
_itoa
wctomb
ferror
iswctype
wcstombs
__badioinfo
__pioinfo
_read
_fileno
_write
_isatty
ungetc
fclose
_vsnwprintf
_vsnprintf
wcsrchr
exit
_wtoi64
_wcsicmp
_vscwprintf
calloc
_wtoi
wcschr
memmove
_vscprintf
_mbsstr
_purecall
_wcsnicmp
wcsstr
??2@YAPAXI@Z
??_V@YAXPAX@Z
free
malloc
??3@YAXPAX@Z
_wcsupr
_wcslwr
_errno
_mbslwr
__CxxFrameHandler
memchr
atoi
_CIsin
memcmp
RasGetConnectStatusW
RasEnumConnectionsW
HttpQueryInfoW
InternetCloseHandle
InternetOpenUrlW
InternetOpenW
InternetReadFile
CreateEnvironmentBlock
DestroyEnvironmentBlock
CreateSiteUIPage
CreateSiteUIPage2
DriverRebootInstall
InitPreCreateUI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ