Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b766904a1f73f37f9c886122965a8fea_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b766904a1f73f37f9c886122965a8fea_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
b766904a1f73f37f9c886122965a8fea_JaffaCakes118
Size
371KB
MD5
b766904a1f73f37f9c886122965a8fea
SHA1
c54d9bfa8d323d60cf357ba6bf508e2b717be000
SHA256
e82c97c709fb68d1edfd613236f8da7b6ac3307ee96bdfdad8402ae979f515ee
SHA512
56a8e95b6d915feeaa56174078675dc36b94d3cda51941220bc6560ca32db71fd8c0de363ec7f3b4d0a051e7c4ed37749ea2e5eb0e457aef2dc746f30684a99b
SSDEEP
6144:T4FWj0coca2PSySoe2DdyFu2CrXHVIXHA7VxVg1oMBJW5oTdYeFxYrWZ9gu4Nb2i:Tmzca2RU2cFrCD1I3A7ra1RBJzSeFx0R
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
StrStrIA
PathFileExistsA
PathFindExtensionA
PathFindFileNameA
PathRemoveExtensionA
PathFileExistsW
PathMatchSpecA
PathAppendA
SHSetValueA
PathRemoveFileSpecA
NetShareEnum
NetApiBufferFree
MultiByteToWideChar
Process32FirstW
ReadFile
SetFilePointer
DeleteFileA
MoveFileExA
CopyFileA
GetSystemDirectoryA
CreateThread
WinExec
GetPrivateProfileStringA
GetWindowsDirectoryA
GetLongPathNameA
CreateMutexA
GetDriveTypeA
GetFileAttributesA
SetFileAttributesA
RemoveDirectoryA
IsBadReadPtr
MapViewOfFile
CreateFileMappingA
GetFileSize
UnmapViewOfFile
WriteFile
GetPrivateProfileIntA
Sleep
Process32NextW
HeapAlloc
GetProcessHeap
LocalAlloc
GetVersionExA
SystemTimeToFileTime
GetSystemTime
FindFirstFileA
FindClose
FindNextFileA
MoveFileA
RemoveDirectoryW
DeleteFileW
GetDriveTypeW
GetLogicalDriveStringsW
WideCharToMultiByte
MoveFileExW
GetShortPathNameW
CreateFileW
FindNextFileW
FindFirstFileW
SetWaitableTimer
CreateWaitableTimerA
LocalFileTimeToFileTime
GetExitCodeProcess
GetVersion
TerminateProcess
CreateFileA
GetFileTime
RaiseException
FileTimeToLocalFileTime
FileTimeToSystemTime
GetModuleFileNameA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcess
CreateProcessA
GetLastError
WritePrivateProfileStringA
WaitForSingleObject
CloseHandle
GetLocalTime
GetStringTypeA
GetStringTypeW
GetCPInfo
LCMapStringA
LCMapStringW
GetACP
GetOEMCP
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
HeapFree
IsBadCodePtr
SetUnhandledExceptionFilter
RtlUnwind
InterlockedDecrement
InterlockedIncrement
HeapReAlloc
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
IsBadWritePtr
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetStdHandle
FlushFileBuffers
wsprintfA
CreateProcessAsUserA
RegCreateKeyA
ChangeServiceConfig2A
StartServiceA
ChangeServiceConfigA
ControlService
RegCreateKeyExW
RegCreateKeyExA
RegSetValueExA
RegFlushKey
GetSidLengthRequired
InitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAceEx
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
GetTokenInformation
LookupAccountSidA
RegEnumValueA
RegDeleteValueA
RegOpenKeyW
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
AllocateAndInitializeSid
SetEntriesInAclA
SetSecurityInfo
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
GetUserNameA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DuplicateTokenEx
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SHGetSpecialFolderPathA
CheckForWorm
CheckForWormWithProcessDetails
IsWorm
ucblock_StopServices
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ