Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a2ec156c644bf390cf2dbce6cb38a611_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a2ec156c644bf390cf2dbce6cb38a611_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a2ec156c644bf390cf2dbce6cb38a611_JaffaCakes118
Size
1.7MB
MD5
a2ec156c644bf390cf2dbce6cb38a611
SHA1
7343f8e053f74a92f67ffd5da92af556ec24eb05
SHA256
5a9b2c426593f8609a8b655f20d7db59bc7cad9e6327231f632a97572ecf6ee4
SHA512
f1cfdd201cc657196f5c8cc1d5a0a545df5cad076a812b55cd16ccdf8267c41cc85a8bd2dc5176d18abb6aa356d567adb211e81f5a53ca6285b2554b436867b0
SSDEEP
49152:gnvdO07eZjqXZyyPUff62fzXGSEWcrMSWQ:ck070a06CjGSTLSW
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\build\lib_common\basic\Release\Basic.pdb
WritePrivateProfileStringW
GetFileSizeEx
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
WaitForMultipleObjects
GetTickCount
MoveFileExW
SwitchToThread
ResetEvent
QueueUserWorkItem
GetSystemInfo
GetVersionExW
ReleaseMutex
CreateMutexW
GetLongPathNameW
GetExitCodeProcess
GetCurrentThread
lstrcpynW
GetLogicalDriveStringsW
GetStartupInfoW
QueryDosDeviceW
VirtualAllocEx
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
GetStdHandle
GetVersion
GetBinaryTypeW
FileTimeToLocalFileTime
OutputDebugStringW
CreatePipe
GetCommandLineW
FormatMessageA
LoadLibraryA
GetModuleFileNameA
lstrcmpW
ProcessIdToSessionId
WTSGetActiveConsoleSessionId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateThread
IsProcessorFeaturePresent
FlushInstructionCache
LocalFree
LocalAlloc
GetPrivateProfileStringW
CopyFileW
FileTimeToSystemTime
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
WideCharToMultiByte
SetFileAttributesW
FindNextFileW
FindFirstFileW
GetFullPathNameW
lstrlenW
DeleteFileW
GetFileAttributesExW
CreateFileW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
WriteConsoleW
FindClose
GetTempFileNameW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
GetConsoleMode
GetConsoleCP
SetFilePointerEx
QueryPerformanceFrequency
CreateProcessA
DuplicateHandle
ExitProcess
GetFileType
SetStdHandle
FindFirstFileExW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
InterlockedFlushSList
GetTempPathW
OpenProcess
CreateProcessW
LoadLibraryW
SystemTimeToFileTime
GetSystemTimeAsFileTime
GetFileTime
FlushFileBuffers
ReadFile
WriteFile
GetFileSize
Sleep
GetCurrentProcessId
GetCurrentProcess
FindResourceExW
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
LockResource
MultiByteToWideChar
FindResourceW
GetModuleHandleW
GetModuleFileNameW
LoadLibraryExW
lstrcmpiW
CloseHandle
SizeofResource
LoadResource
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetLastError
GetLastError
GetCurrentThreadId
RaiseException
GetProcAddress
FreeLibrary
InterlockedDecrement
InterlockedIncrement
RtlUnwind
GetSystemWindowsDirectoryW
FreeResource
CreateDirectoryW
SetFileTime
GetSystemDirectoryW
lstrcmpiA
lstrcmpA
DeviceIoControl
GetPrivateProfileIntW
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
MoveFileW
EnumSystemLocalesW
VirtualFree
LoadLibraryExA
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TryEnterCriticalSection
AreFileApisANSI
HeapCreate
InterlockedCompareExchange
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
SetFilePointer
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetFileAttributesW
HeapValidate
GetTempPathA
DecodePointer
CreateEventW
GetDiskFreeSpaceA
GetFileAttributesA
FlushViewOfFile
CreateFileA
WaitForSingleObjectEx
GetVersionExA
DeleteFileA
HeapCompact
UnlockFile
CreateFileMappingA
LockFileEx
GetSystemTime
QueryPerformanceCounter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FormatMessageW
ReadConsoleW
SetEvent
GetStringTypeW
VirtualAlloc
IsWindowVisible
UnionRect
EqualRect
SetCursor
DrawFocusRect
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
UnregisterClassW
RegisterClassExW
ShowWindow
LoadCursorW
FindWindowExW
SetWindowLongW
CharNextW
DestroyWindow
IsWindow
CreateWindowExW
OffsetRect
PostThreadMessageW
GetParent
GetWindowLongW
ScreenToClient
GetClientRect
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
KillTimer
SetTimer
ReleaseCapture
SetCapture
GetAsyncKeyState
CallWindowProcW
PostQuitMessage
DefWindowProcW
GetWindow
CopyRect
SendMessageW
PostMessageW
wsprintfW
GetWindowThreadProcessId
GetShellWindow
FindWindowW
PtInRect
GetClassInfoExW
CreateCompatibleBitmap
RectVisible
GetObjectW
CreateDIBSection
SelectObject
SaveDC
RestoreDC
DeleteObject
DeleteDC
CreateCompatibleDC
BitBlt
SetViewportOrgEx
OffsetViewportOrgEx
SetTokenInformation
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
EqualSid
GetTokenInformation
OpenThreadToken
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegQueryValueExW
DuplicateTokenEx
LookupPrivilegeValueW
GetLengthSid
CreateWellKnownSid
AdjustTokenPrivileges
OpenProcessToken
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
SHCreateDirectoryExW
SHGetFolderPathW
SHFileOperationW
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteExW
ord165
SHGetSpecialFolderPathW
CoCreateGuid
CoInitializeSecurity
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoInitialize
VariantInit
SysFreeString
SysAllocString
VariantClear
VariantTimeToSystemTime
SystemTimeToVariantTime
VarUI4FromStr
VarDateFromStr
PathRemoveFileSpecW
StrStrIW
SHGetValueA
SHSetValueA
StrCmpIW
StrStrIA
StrTrimA
StrCmpNIW
PathAppendW
PathFileExistsA
wnsprintfW
PathFileExistsW
PathIsRootW
PathIsRelativeW
PathFindFileNameW
PathFindExtensionW
PathIsDirectoryW
PathCombineW
SHGetValueW
AssocQueryStringW
_TrackMouseEvent
WTSQueryUserToken
MakeSureDirectoryPathExists
InternetCrackUrlW
InternetGetConnectedState
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcesses
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
CertGetNameStringW
WTHelperProvDataFromStateData
WinVerifyTrust
GetAdaptersInfo
GdipCreateFromHDC
GdipDeleteBrush
GdipCreateSolidFill
GdipGetImageWidth
GdipGetImageHeight
GdipDeleteGraphics
GdipFillRectangleI
GdipDrawImageRectRect
URLDownloadToCacheFileW
URLDownloadToFileW
CreateTrayClient
GetBrowserVisitor
GetLuaExplain
luaopen_LDSBasic
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ