Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d08880b79d11cf14fe5396dae784d7ab_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d08880b79d11cf14fe5396dae784d7ab_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d08880b79d11cf14fe5396dae784d7ab_JaffaCakes118
Size
1.3MB
MD5
d08880b79d11cf14fe5396dae784d7ab
SHA1
5c8311a41ea4897962796c1ea535b9119f61ec4d
SHA256
327fe0696d1193acaa5de23b2e11199b9577752a093a2a4a25fb19638a84f481
SHA512
54354bf87d5c60a77805d9df00e24a928e6cfce8701b886999ce4f6b7da126e547652e35a457438f5818fc8a316ab1b1c6ef877def9ba00284d87ce6410a8676
SSDEEP
24576:hfjSfs22L6XgRIwQgmRPccx0ujruAohsMWhjJX96qhLSy/+gAouEpo3:UALwg2Bx0ujruAohsMWhjF0qhLSy/QOo
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\TeamCity\buildAgent\work\e12d9006a5dc3f1c\out\win32\pdb\wizard.pdb
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
WideCharToMultiByte
CreateDirectoryW
GetModuleFileNameW
FindClose
GetFileAttributesW
GetVersionExW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleW
ReadFile
WriteFile
SetEndOfFile
CreateFileW
CloseHandle
InterlockedCompareExchange
EnterCriticalSection
HeapAlloc
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
CreateEventW
Sleep
SetEvent
TerminateThread
DeleteFileA
GetFileSizeEx
SetLastError
GetCommandLineW
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
MoveFileExA
CreateFileA
Process32FirstW
LoadLibraryW
GetLocalTime
LocalFree
GetTickCount
GetComputerNameA
WriteConsoleW
SetStdHandle
FindResourceW
LoadResource
FindResourceExW
RaiseException
HeapReAlloc
LockResource
GetLastError
MultiByteToWideChar
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
WaitForMultipleObjects
SizeofResource
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
FlushFileBuffers
ReadConsoleW
GetConsoleMode
GetFileType
GetStdHandle
IsDebuggerPresent
OutputDebugStringW
GetStringTypeW
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
SetFilePointerEx
DeviceIoControl
AreFileApisANSI
FormatMessageA
InterlockedFlushSList
RtlUnwind
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
ExitProcess
GetModuleFileNameA
GetACP
RegEnumKeyExW
IsValidSid
OpenProcessToken
RegDeleteValueW
GetTokenInformation
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegDeleteKeyW
SHGetFolderPathW
CoCreateGuid
StrToIntW
PathRemoveFileSpecW
PathFileExistsA
PathFileExistsW
StrToIntExA
StrToInt64ExW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
InternetCrackUrlA
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
InternetConnectA
InternetOpenA
InternetReadFileExA
HttpOpenRequestA
?$TSS0@?1??getActionWrapper@@9@4HA
?$TSS0@?1??get_instance@?$singleton@Vupdate_directory@@@serialization@boost@@CAAAVupdate_directory@@XZ@4HA
?get_const_instance@?$singleton@Vupdate_directory@@@serialization@boost@@SAABVupdate_directory@@XZ
?get_instance@?$singleton@Vupdate_directory@@@serialization@boost@@CAAAVupdate_directory@@XZ
?get_mutable_instance@?$singleton@Vupdate_directory@@@serialization@boost@@SAAAVupdate_directory@@XZ
?instance@?$singleton@Vupdate_directory@@@serialization@boost@@0AAVupdate_directory@@A
?instance@?1??getActionWrapper@@9@4Vaction_wrap@@A
?t@?1??get_instance@?$singleton@Vupdate_directory@@@serialization@boost@@CAAAVupdate_directory@@XZ@4V?$singleton_wrapper@Vupdate_directory@@@detail@34@A
getActionWrapper
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ