Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a9a994aea07fba10c5e41f61917c8735_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a9a994aea07fba10c5e41f61917c8735_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a9a994aea07fba10c5e41f61917c8735_JaffaCakes118
Size
395KB
MD5
a9a994aea07fba10c5e41f61917c8735
SHA1
9111273f6a0b88fb660af578da5244b816cbada4
SHA256
8716b235f34b261d7ff52863d93c053703e5055167da9affaacd398a9c0b79a5
SHA512
ef18296e982242a2274d7c6f32180384776be3714aaab6f5b6eed13ca6ce3e9138a5b142e494848dd74170f0da6afbe981b1ce38ce6b883c7b550d8ce0223ed2
SSDEEP
12288:XWs84sgmc0ELfH21Ex/y/DS/bfF4AVDdY5rXlPTtkR7Y8QkELbKZWO:X784xmc0ELv26xtbF4AVDdarlrGR7Y8/
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
gethostbyname
WSACleanup
WSAStartup
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemRealloc
InternetCrackUrlA
InternetReadFile
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
GetUrlCacheEntryInfoA
DeleteUrlCacheEntry
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
URLDownloadToFileA
InitializeCriticalSection
DeleteCriticalSection
GetLocalTime
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
CloseHandle
UnmapViewOfFile
ReleaseMutex
FlushViewOfFile
WaitForSingleObject
CreateMutexA
FindClose
FindFirstFileA
GetCurrentDirectoryA
CopyFileA
SetFileAttributesA
GetLastError
GetSystemTimeAsFileTime
SetErrorMode
GetPrivateProfileSectionA
SetEndOfFile
FlushFileBuffers
GetDiskFreeSpaceExA
SetFilePointer
GetBinaryTypeA
GetFullPathNameA
QueryDosDeviceA
MultiByteToWideChar
GetShortPathNameA
GetTempFileNameA
GetTempPathA
Sleep
GetWindowsDirectoryA
DeleteFileA
GetVolumeInformationA
GetSystemDirectoryA
FindNextFileA
lstrcmpA
lstrcatA
lstrcpyA
CreateDirectoryA
GetVersionExA
SetProcessWorkingSetSize
GetCurrentProcess
GetTickCount
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
HeapFree
GetProcessHeap
HeapAlloc
WideCharToMultiByte
InterlockedDecrement
lstrlenA
GetCurrentThreadId
GlobalUnlock
GlobalLock
GlobalAlloc
lstrlenW
MulDiv
InterlockedIncrement
RaiseException
GetLogicalDrives
GetLogicalDriveStringsA
SetPriorityClass
GetModuleHandleA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetProcAddress
LoadLibraryA
CreateThread
SetEvent
OpenEventA
CreateProcessA
WaitForMultipleObjects
CreateEventA
Module32Next
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
ReadFile
CreateFileA
TerminateProcess
DeviceIoControl
VirtualAlloc
VirtualFree
WriteFile
GetStdHandle
QueryPerformanceCounter
IsBadWritePtr
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetOEMCP
GetCPInfo
LCMapStringW
LCMapStringA
RemoveDirectoryA
GetCommandLineA
HeapReAlloc
VirtualQuery
GetSystemInfo
VirtualProtect
GetFileAttributesA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitProcess
RtlUnwind
SetUnhandledExceptionFilter
GetCurrentProcessId
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
GetTimeZoneInformation
SetStdHandle
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalFree
TlsGetValue
HeapDestroy
HeapCreate
GetModuleFileNameA
AdjustWindowRectEx
FindWindowExA
PostMessageA
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
RedrawWindow
GetDlgItem
IsWindow
DestroyAcceleratorTable
GetFocus
IsChild
GetWindow
SetFocus
BeginPaint
EndPaint
GetDesktopWindow
InvalidateRgn
InvalidateRect
FillRect
SetCapture
ReleaseCapture
GetSysColor
CreateWindowExA
CallWindowProcA
EnumWindows
RegisterClassExA
GetWindowTextLengthA
GetWindowTextA
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
GetForegroundWindow
SetForegroundWindow
SystemParametersInfoA
MapWindowPoints
SetActiveWindow
LoadCursorA
GetClassInfoExA
KillTimer
SetTimer
SetWindowPos
MoveWindow
SetWindowTextA
SendMessageA
GetWindowLongA
SetWindowLongA
DestroyWindow
PostQuitMessage
wsprintfA
SetWindowRgn
ReleaseDC
GetDC
GetWindowRect
GetClientRect
GetSystemMetrics
LoadImageA
UnregisterClassA
ShowWindow
UpdateWindow
RegisterWindowMessageA
PeekMessageA
CreateSolidBrush
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleBitmap
DeleteDC
SelectObject
CreateCompatibleDC
CombineRgn
DeleteObject
CreateRectRgn
GetPixel
SaveDC
RestoreDC
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueA
RegQueryInfoKeyA
RegEnumValueA
RegCreateKeyExA
GetUserNameA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegSetKeySecurity
RegNotifyChangeKeyValue
RegQueryValueExA
VarUI4FromStr
DispCallFunc
LoadTypeLi
LoadRegTypeLi
VariantInit
OleCreateFontIndirect
SysStringByteLen
VariantClear
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
Always
ConfigCast
GetFulIE
GetPlayerVersion
ICastAdSpecial
OpenAdwars
PopupAdware
PrioritSetAd
SetAdWorkOn
UpdateAdInfo
playAdh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ