Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3492d8347222678cac126859b883709e_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3492d8347222678cac126859b883709e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3492d8347222678cac126859b883709e_JaffaCakes118
Size
314KB
MD5
3492d8347222678cac126859b883709e
SHA1
0619ff7e3a869b87d98856276a7d882ab0acf8a3
SHA256
c542f99171ac8ac99ec1c52fdc87cbdde9e1abf1287a91704e8bd89887c3cbf1
SHA512
9db99e8ed9c0bb00c60528c7dbb25ea211cff29f9854f69b2a4c09d359a8a14d205052705901694ebb18f66e6aae613ff0364ab46b6821526708fad41a72127e
SSDEEP
6144:LfnMZZ+rxXF6sW6zRcisUCU2YJFh14KClUdOqnTu:znMzKws3zs/U2YJXqxlUdOQTu
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindWindowA
SendMessageA
wsprintfA
GetWindowThreadProcessId
IsWindowVisible
PostMessageA
GetClassNameA
EnumWindows
SetWindowTextA
ReleaseDC
GetDC
GetClientRect
GetSystemMetrics
_adjust_fdiv
_initterm
_onexit
__dllonexit
_vsnprintf
wcstoul
wcsstr
wcspbrk
wcsspn
wcslen
wcsrchr
wcschr
wcsncmp
wcscmp
wcsncat
wcscat
wcsncpy
wcscpy
strtoul
memchr
strpbrk
strcspn
strspn
strncpy
ftell
_iob
fopen
fseek
fprintf
fflush
fwrite
fclose
localtime
strncmp
rand
isdigit
isalpha
_strnicmp
_itoa
time
_except_handler3
sprintf
strncat
strstr
_splitpath
_fullpath
strchr
atoi
strcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
_stricmp
__CxxFrameHandler
_sopen
_filelength
strcpy
strlen
strrchr
strcat
memset
memmove
memcpy
free
malloc
_close
_read
_wcsnicmp
ord1619
ord5603
ord6876
ord834
ord539
ord832
ord6781
ord699
ord912
ord4188
ord397
ord6779
ord6927
ord2827
ord4204
ord4203
ord800
ord6648
ord6140
ord341
ord5858
ord654
ord1871
ord861
ord547
ord1099
ord2919
ord1622
ord5465
ord533
ord5194
ord6407
ord1997
ord798
ord6282
ord6283
ord5710
ord354
ord5186
ord1979
ord6385
ord3790
ord3318
ord665
ord4277
ord939
ord6877
ord537
ord2763
ord2915
ord5572
ord5683
ord4129
ord941
ord6143
ord6883
ord5861
ord5608
ord860
ord801
ord541
ord6383
ord5440
ord6394
ord5450
ord3663
ord535
ord6929
ord940
ord4202
ord2764
ord924
ord922
ord858
ord926
ord2614
ord540
ord2818
ord2813
GetFileAttributesA
GetFileTime
SetFileTime
CreateDirectoryA
GetFullPathNameW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MoveFileA
GetEnvironmentVariableA
SetEnvironmentVariableA
FlushFileBuffers
GetCurrentThreadId
VerLanguageNameA
IsBadReadPtr
IsBadWritePtr
GetSystemInfo
GetSystemDefaultLangID
FormatMessageA
OutputDebugStringA
GetDriveTypeA
QueryDosDeviceA
ReadProcessMemory
CreateProcessA
CopyFileA
TerminateProcess
GetExitCodeThread
DebugActiveProcess
SuspendThread
LocalAlloc
LocalFree
GetTempPathA
GetCurrentDirectoryA
GetVolumeInformationA
lstrcmpiA
GetVersionExA
GetVersion
GetCurrentThread
FreeLibrary
LoadLibraryA
GetShortPathNameA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
WritePrivateProfileStringA
Sleep
lstrcmpA
GetCurrentProcessId
OpenProcess
GetCurrentProcess
DuplicateHandle
lstrcmpiW
CreateThread
WaitForSingleObject
TerminateThread
VirtualQuery
GetFileType
VirtualAlloc
VirtualFree
FindNextFileW
FindNextFileA
lstrcpyW
FindFirstFileW
SetLastError
lstrlenA
FindFirstFileA
FindClose
DeleteFileA
SetCurrentDirectoryA
lstrcpyA
GetTickCount
MoveFileExA
SetFileAttributesA
RemoveDirectoryA
GetLastError
lstrcpynA
ExpandEnvironmentStringsA
lstrcatA
GetFileInformationByHandle
GetProcessHeap
HeapAlloc
HeapFree
MultiByteToWideChar
WideCharToMultiByte
TlsGetValue
TlsSetValue
GetPrivateProfileStringA
GetFullPathNameA
GetModuleFileNameA
TlsAlloc
TlsFree
GetSystemDirectoryA
GetModuleHandleA
GetProcAddress
GetWindowsDirectoryA
SetFilePointer
WriteFile
ReadFile
CloseHandle
CreateFileA
GetFileSize
RegOpenKeyA
RegRestoreKeyA
RegCreateKeyExA
DeleteService
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ControlService
QueryServiceStatus
RegEnumValueA
RegDeleteValueA
RegCreateKeyA
RegSaveKeyA
GetUserNameA
LookupAccountNameA
InitializeAcl
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegGetKeySecurity
RegSetKeySecurity
RegQueryInfoKeyA
RegEnumKeyA
GetLengthSid
CopySid
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegSetValueExA
GetFileSecurityA
SetFileSecurityA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ShellExecuteA
SHGetMalloc
ShellExecuteExA
CoCreateInstance
CoTaskMemFree
SHGetValueA
SHDeleteKeyA
PathCompactPathA
PathAppendA
PathCombineA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
BBAddWhitePath
BBAddWhiteScanName
BBAddWhiteScanNames
BBBEnum
BBBInit
BBBkupLogElementAt
BBCheckScanResult
BBCloseLib
BBCloseRepairFile
BBCloseScanFile
BBDeleteDir
BBDeleteFile
BBDeleteRegKey
BBDeleteRegValue
BBFailLogElementAt
BBFiniThread
BBGetBkupLogCount
BBGetDBVersion
BBGetFailLogCount
BBGetLongPathName
BBGetMD5
BBGetOpton
BBGetReport
BBGetScanLog
BBGetScanLogCount
BBGetScanLogSize
BBGetScanName
BBGetScanNameCount
BBGetScanNameId
BBGetScanNameInfo
BBGetScanNameLength
BBGetSpywareNameById
BBImmunize
BBImmunizeOne
BBInitLib
BBInitRepairFile
BBInitScan
BBInitScanFile
BBInitThread
BBInitWhitePath
BBInitWhiteScanName
BBIsRepairFailed
BBKill2Me
BBMakeBkupLog
BBRepair
BBRepairFile
BBScan
BBScanFile
BBScanFilePath
BBScanLogElementAt
BBSetBinPath
BBSetDbgCallBack
BBSetOption
BBSetScanLog
BBSetStartPage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ