Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a194dea8b0613e3af8c26601f23bbce2_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a194dea8b0613e3af8c26601f23bbce2_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
a194dea8b0613e3af8c26601f23bbce2_JaffaCakes118
Size
1.1MB
MD5
a194dea8b0613e3af8c26601f23bbce2
SHA1
1b91c75ce2e9c6218803e1b551a9332ae3bb4e4d
SHA256
f297141befb54e875c437461fc22f7670501819106326e600f5095f245e47a9d
SHA512
a14834288c8c71997696c5b61590472433ef37245383b0b1ffa9af88aa4e8f1afff2242f936ef48dea04796c024f557083c6a1af38cb9d7ea4b03cab780ee307
SSDEEP
24576:NS2RadeAO49mNdsET2QM1bEi06r/AWWao99L2RPP3ThyZui3YGX:NIq40jslQM1bEgNzw9iRPP3ThIui3Ym
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
MiniDumpWriteDump
GlobalAlloc
GlobalFree
WideCharToMultiByte
lstrcpyW
SetLastError
GetCurrentProcess
CreateProcessW
WriteFile
SetFilePointer
CreateFileW
GetFileSize
GetModuleFileNameW
GetModuleHandleW
WaitForMultipleObjects
GetCurrentThreadId
CreateEventW
SetEvent
ResetEvent
GlobalMemoryStatusEx
GetTickCount
LoadLibraryW
MultiByteToWideChar
FreeLibrary
GetLocalTime
OpenMutexW
SetEndOfFile
GetExitCodeProcess
HeapFree
HeapAlloc
LocalFree
GetProcessHeap
SetStdHandle
HeapReAlloc
SetEnvironmentVariableA
SetFilePointerEx
GetCurrentProcessId
CloseHandle
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
OpenProcess
WaitForSingleObject
TerminateProcess
MoveFileExW
DeleteFileW
GetLastError
Sleep
SetFileAttributesW
GetFileAttributesW
CreateMutexW
lstrcpynW
WriteConsoleW
OutputDebugStringW
GetProcAddress
TlsGetValue
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapSize
GetConsoleMode
GetConsoleCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
GetCommandLineA
TlsSetValue
TlsFree
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
ResumeThread
GetACP
LoadLibraryExW
GetVersionExW
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
QueryDosDeviceW
InitializeCriticalSection
ReleaseMutex
GetVolumeInformationW
GetDiskFreeSpaceW
GetLogicalDriveStringsW
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
ReadFile
SetFileTime
GetFileTime
FileTimeToSystemTime
ExpandEnvironmentStringsW
GetEnvironmentVariableW
FindNextFileW
FindClose
InterlockedExchange
InterlockedExchangeAdd
lstrlenW
CreateDirectoryW
GetFullPathNameW
GetTempPathW
GetSystemDirectoryW
GetCurrentDirectoryW
GetWindowsDirectoryW
GetTempFileNameW
GetFileSizeEx
RaiseException
DeviceIoControl
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
CreateThread
ExitThread
FreeLibraryAndExitThread
GetStdHandle
GetFileType
GetTimeZoneInformation
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
FlushFileBuffers
wsprintfW
GetSecurityDescriptorDacl
GetAclInformation
GetAce
EqualSid
SetEntriesInAclW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
GetFileSecurityW
LookupAccountNameW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
SetTokenInformation
AllocateAndInitializeSid
OpenProcessToken
FreeSid
CreateProcessAsUserW
GetLengthSid
DuplicateTokenEx
SHGetFolderPathW
CheckInstallerInstance
CheckUserID_01
CheckUserID_02
CheckUserID_03
CheckUserID_04
CheckUserID_05
CreateLowIntegrityProcess
DeleteInstallFile
EndSafeCenterConfigRequest
FindProcess
GetSafeCenterCloseReason
GetSafeCenterConfig
GetSpecialBuild
IsSafeCenterExist
IsSafeCenterOpen
IsValidUserID
KillProcess
StrKeyValueReport
UnInstallSafeCenter
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ