Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
498f80f77576574d9cc1cedaef2e8951_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
498f80f77576574d9cc1cedaef2e8951_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
498f80f77576574d9cc1cedaef2e8951_JaffaCakes118
Size
115KB
MD5
498f80f77576574d9cc1cedaef2e8951
SHA1
3588016208ef7afe83f2c649cf958fbf5186fb50
SHA256
23202a74bdfa1ee310a4012a80b1a74e86e5c9f693f2c790a8c624ccae0cef12
SHA512
9307e9c239ed8c4ee78e0974feb25384956d75e6be06758fa71bc1a86d69e7a4c1ce9f7260a58c3313a339bb21b6625461fbb7c2d338b5d9af08823e1f4f1baa
SSDEEP
1536:kAGQQM12uEFrnB6xD6XMYuuHIkeboqdsJVC/tabrbwoXFNF51EZrf9xV6fOu+r+k:kAEFbB42TeboqW2abTqrkGeVdfkQCsw
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegQueryValueExA
CreateServiceA
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
QueryServiceConfigA
EnumServicesStatusA
ChangeServiceConfigA
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
OpenServiceA
RegCloseKey
GetUserNameW
LookupPrivilegeValueA
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
OpenSCManagerA
DeleteService
ControlService
CloseServiceHandle
CreateCompatibleBitmap
CreateDCA
CreateCompatibleDC
SelectObject
BitBlt
DeleteObject
GetDeviceCaps
GetDIBits
DeleteDC
ImmReleaseContext
ImmGetCompositionStringW
ImmGetCompositionStringA
ImmGetContext
FlushFileBuffers
CreateDirectoryA
MoveFileA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetFileAttributesExA
FindClose
GetLastError
FindNextFileA
lstrcmp
FindFirstFileA
lstrcmpi
Process32Next
Process32First
CreateToolhelp32Snapshot
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
ExitProcess
GetCommandLineA
GetProcAddress
FreeLibrary
LocalAlloc
InterlockedExchange
SetFilePointer
lstrlenW
lstrcatW
OpenEventA
OpenMutexA
GetFileSize
GlobalAlloc
GlobalLock
lstrcpyW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
GetFileSizeEx
SetFilePointerEx
ReadFile
GetCurrentProcess
GetPriorityClass
GetThreadPriority
SetPriorityClass
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
GetVersionExA
TerminateProcess
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetACP
GetOEMCP
GetLocalTime
GetTempPathA
WriteFile
GetCurrentThread
WideCharToMultiByte
SearchPathA
GetModuleFileNameA
RaiseException
LoadLibraryA
OpenProcess
GetCurrentProcessId
lstrlen
DeviceIoControl
CreateFileA
CloseHandle
GetSystemDirectoryA
SetEvent
DeleteFileA
lstrcpy
GetCurrentThreadId
GetStartupInfoA
CreateProcessA
Sleep
lstrcat
WaitForSingleObject
GetTickCount
LoadLibraryA
VirtualProtect
GetModuleFileNameA
ExitProcess
strrchr
__dllonexit
_onexit
_initterm
_adjust_fdiv
malloc
wcscmp
free
strchr
_beginthread
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
GetModuleFileNameExA
ShellExecuteA
SHFileOperation
SHEmptyRecycleBinA
StrCmpW
StrChrA
StrStrA
StrRChrA
SHDeleteKeyA
StrCmpNIA
StrToIntA
ExitWindowsEx
CallNextHookEx
OpenInputDesktop
GetThreadDesktop
GetMessageA
SendInput
SetCursorPos
PostMessageA
OpenDesktopA
GetForegroundWindow
SetWindowsHookExW
GetWindowTextA
GetWindowThreadProcessId
wsprintfW
GetActiveWindow
CharUpperA
PostThreadMessageA
EnumWindows
UpdateWindow
BringWindowToTop
ShowWindow
DestroyWindow
DispatchMessageA
SendMessageA
SetThreadDesktop
MessageBoxA
wsprintfA
UnhookWindowsHookEx
OpenWindowStationA
SetProcessWindowStation
CloseDesktop
CloseWindowStation
IsWindow
MessageBoxA
waveInUnprepareHeader
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveInStop
waveInClose
waveInOpen
listen
setsockopt
bind
socket
htons
send
connect
closesocket
htons
accept
WSADuplicateSocketA
WSAStartup
select
recv
inet_addr
gethostbyname
inet_ntoa
getsockname
CreateStreamOnHGlobal
168988288
5286758898
ServiceMain
����UF����WW�f�������Y~-f�qP�v��u+T��U�H���#�������e�/}���ݘָ�t�3{�w���*r*lNL�WV+��&s('���og��"�� 2o+�1��E@��� o�7/5��k���e�R�%R^�ò��LR�<�'�ŷ������F�cP7�]�|���΄� � �����˫���1�� ��^���mI����T�#�ܪ6!���y���ux{���칭��/jc4 7M�Y��a�L�"I�����x���v�.�`$3X��9=��v��w}�3� �d���3i\�ȋ"�S�akH^'��6Zw�.!��#�����$X/��ك��4��~[����g��K����j��@\�b����1" �h�%�e$�,nQ�s.����' +Z�� V�~Y[��X���]��QJ����Q���$����% ��d�F�K ��'%� �tY_� �R��H�;'"ŕvg�K� �����N�eQ �_�?���97�|6ձ��+���L|Wիv�3k��+Ô��ܜ�ux,*�%�i���:�V��<����ń[����e�>簃2��.z��n���@�� U�1�qQ�Z31 D�L�#Q�*{��v$4�I�h�OL���f���x��R�DyK~`����q(����}]�q����w$���gm��,��GЁ�~�=�ð���4ӸԱ&:h�[^�[u0՝m�%5��g�/5zs*���ڝ�Xwy�Ũԇ��t��^r#�!w�� v8�s�ZB�z����ˬ�S��u�w��r�Kw�������^�D5$h�+NA��^�~�`{y��4��NJi4O�˕��ox��[�2E{�u�L$��@��W_�ܩ)xK�S9Wȿ=Y��?���)z�*-�ͣ9���p�����v����w?^�%ԝ;wb���uD ��9�M��¢��n�����t��o_9�*�U/Y,��7�Ě�+V�������п���h8�8�r��}���5Q�q�y�ѩ>�6�<�����Ռ��KҢ�OI{F+��PO�s�0�{�k$���[�� ξ#N}iBE��r�u�.� ���O��Cj>�#�{�y���!�Pc��]�=geCx�o�����ƍ�� �֊���H�٢l ��oP�W��?sX�����á���;�5��v&qwu� �"��`n��9n�ɮ�T�+]�ܥfp!�K�C-֭=2oV�� ��g'��?`b�t �����O;�#[m�L�Me9���b� �#��鸔�M�"4A��v}e����&̺���(����4���Y��bop�h��d����� ��Q/�Xw�;�b�R��y�o3j�13(a �)�?t� &���kx�G~�B��W��aU���7��f����S�� �tK���(a�R�� 0�b1y+�B.�d���|ʖJ�U/3Ŭ���Wv��yT���X�d/ �T���!�}+4R�neU�)���*͢��o�c��p>J� �ft�6<��������Qݼ;JEcp�����~�p����s����暄Y��&0Ȋk������©�ĺę�,`~rIX�߸@,c��Poު��n,�5_�����Ի)� @%/EW*737ВЧa��n�˨�h_J��x����m`0V$n��ۄ3%*�(���>�s�&�<�i�R�1�D�����Y��F�)o�`���y�9��H� y4P��goك��,3����'xh96$�J*��/�� ��Q��$A��]k�YF�U�%���;��\��>��|3.��aw'R^P�G�����C�Ɲ�1��'�lu�7v�����*����_�EM�9���~��E��a�7'l�8�Q?[եP�a+4 /@=Z�� �a�;�_ Q{O�7��fDI��bL18B�AH��͔*D��O8��ˮ�� *� �i��0���ȍ/!N}�H�!�� r� +�d�dž�1ĕ����^_����q��0J:ې��#q��`�xe�r���圐C���$�W �{�5Y�{�8�e�T��敮�~r��U�k�W�O ��)�a��k���\@=��|l���M�ހF�ktiR?8n%\@0x'�cLO؋����zD��L�h�{�ᇆ]�"��y����>$�f0[l%�f�D����Db^�N�qe���h�k�6 ��A��Ġ��(��%���ؽE!hc��,��UIʼ����z'W�^�#��uR��Ov��<��#� ��4c[eFb{�`69��kwe��ap+�'��8�|v�9X-��e�+#��r�����T?�@Xxti�W��q��jA�C��%��"2"]�ʖν;�\ڊ�m�i�w����1j�����/�� �:ì�>+O�pV7G5ЪȦw���&�(��'�_��:���7���Y��������(_��1H�1-�g:7K��]��헠 ���^M�Ui8��3��,$�[��$�����7%�N��,�S5f��۹����@�F���Ia�@�)4���$�����"����P��^9E�6�l�R.�iL��R��J����M��>�,�!*z�qm�������<fx�N-\m�}44&� �$na��Za��e�R�)��brچ���{}}���H�S�R��|=������cUk���]�0�+��fy�s|".U9��P���m0�5�$VCX���e�C�^܇��μ�܈k�/�RK���PxӲ�����NA �[��sW��� ��0�_�ƞ���$��aB�9����4r*Z�k��NV���?Q��e���֣!ݮ��}���j�<Y ș�����³ũ�<FY�^����[1��2��ƺqfC�@�|�kD�����3@�I�����ێ���H���Fw �y�:�����)�6w�+3�����9�x� 9w7�]ɸ�Nq�p���"��C��.���ڡ����p��r��c�0̙9<��r�S�f�0�$���T'�#��iN�&�!�R�'U���d�����j����_�n��L�мsm���,^](�Q��G���̿���x���^U�� nR�[��/��!ˌ�Y�\�� *(Cǡa0Z�z�9�[�(
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ