Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a2a58ac548b736e54602b29a6b43ed72_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2a58ac548b736e54602b29a6b43ed72_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
a2a58ac548b736e54602b29a6b43ed72_JaffaCakes118
Size
1.1MB
MD5
a2a58ac548b736e54602b29a6b43ed72
SHA1
4cf2b9c32f326d23e000d2f795112ef58c55fc61
SHA256
5ca2f4bd8d9d97456d3f361c29a8a079e3171c32627e8188896f1c33a0ee5398
SHA512
f6d9fbac432379a772f6270bde9744144205c77b2dfd57344848932758587a3b1098ea6e8456b4eae365820d59a8909f4fc07544a8e31b923d3fc86569b169b4
SSDEEP
24576:2i5hCrYZN/32HVSKMu80768kmqsHdfrP7OXTGZW6uDZ:CrY/2HVSRLaLdj7OTGZhuDZ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
G:\se9_bd\src\out\tdsetuprelease\setup.dll.pdb
RegCloseKey
RegOpenKeyExW
SetEntriesInAclW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
DuplicateTokenEx
GetTokenInformation
RegDeleteKeyW
RegEnumKeyExW
GetUserNameW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SystemFunction036
CreateProcessAsUserW
RegDeleteValueW
RegQueryValueExA
SetFilePointer
SetFileTime
GetCommandLineW
DeleteFileW
GetTempFileNameW
GetTempPathW
SetUnhandledExceptionFilter
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
GetCurrentThreadId
GetTickCount
VirtualAlloc
VirtualFree
VirtualQuery
FreeLibrary
GetProcAddress
LoadLibraryW
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
RemoveDirectoryW
SetFileAttributesW
LocalFree
CopyFileW
MoveFileW
WaitForSingleObject
WaitForMultipleObjects
CreateProcessW
OpenProcess
ExpandEnvironmentStringsW
CreateThread
DeviceIoControl
GetVersionExW
GetDiskFreeSpaceExW
SetEndOfFile
SetEvent
ResetEvent
CreateEventW
SetWaitableTimer
CancelWaitableTimer
Sleep
CreateWaitableTimerW
TlsAlloc
TlsSetValue
TlsFree
IsBadReadPtr
IsBadWritePtr
SystemTimeToFileTime
GetLongPathNameW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
MoveFileExW
GetPrivateProfileStringW
EnumResourceNamesW
SetErrorMode
LoadLibraryExW
CreateMutexW
LoadResource
DebugBreak
OutputDebugStringW
TerminateThread
lstrlenA
lstrlenW
SetEnvironmentVariableW
GetDriveTypeW
GetLogicalDriveStringsW
SetLastError
GetExitCodeProcess
ResumeThread
AssignProcessToJobObject
GetModuleHandleW
ReadFile
GetFileTime
GetCurrentThread
GetEnvironmentVariableW
LoadLibraryExA
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
EnumSystemLocalesW
IsValidLocale
GetACP
ReadConsoleW
GetModuleFileNameA
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
GetFileType
FreeLibraryAndExitThread
ExitThread
ExitProcess
RtlUnwind
InterlockedFlushSList
OpenThread
ReleaseMutex
GetSystemTime
LocalFileTimeToFileTime
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
LCMapStringW
EncodePointer
FormatMessageW
GetTimeZoneInformation
CreateFileA
VirtualProtect
FlushInstructionCache
SetThreadContext
GetThreadContext
SuspendThread
GetWindowsDirectoryW
GetUserDefaultUILanguage
GetLocaleInfoW
CompareStringW
CreateRemoteThread
HeapWalk
HeapUnlock
HeapLock
ReadProcessMemory
TryEnterCriticalSection
TlsGetValue
RtlCaptureStackBackTrace
FindResourceW
SizeofResource
CloseHandle
WriteFile
CreateFileW
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
DecodePointer
lstrcpynW
LockResource
SetFilePointerEx
GetCurrentDirectoryW
OutputDebugStringA
FormatMessageA
GetModuleHandleExW
GetFileAttributesExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
ReplaceFileW
GetModuleHandleA
lstrcmpA
lstrcmpiA
GetSystemDirectoryW
GetNativeSystemInfo
GetUserDefaultLangID
GetStdHandle
SetHandleInformation
GetUserDefaultLCID
FindFirstFileExW
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
GetSystemInfo
IsDebuggerPresent
WritePrivateProfileStringW
WritePrivateProfileStructW
FlushFileBuffers
GetFileSizeEx
CoUninitialize
CoInitializeEx
OleInitialize
OleUninitialize
PropVariantClear
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
VariantInit
SysStringLen
SysAllocString
SysFreeString
VariantClear
GetModuleInformation
EnumProcesses
GetModuleFileNameExW
StrCpyW
PathFindFileNameA
PathFindFileNameW
SHGetValueW
StrStrIW
PathFileExistsW
PathIsDirectoryW
PathRemoveFileSpecW
PathGetDriveNumberW
SHSetValueW
PathAppendW
SHGetValueA
wsprintfW
LoadStringW
CharNextW
IsWindow
SendMessageTimeoutW
CharUpperW
GetClassNameW
GetDesktopWindow
GetShellWindow
GetWindowThreadProcessId
GetWindow
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
timeGetTime
GetUserNameExW
Netbios
DestroyEnvironmentBlock
CreateEnvironmentBlock
?Wide2ASCII@installer@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@ABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@3@@Z
FastInstall
GetHandleVerifier
setup
setupEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ