Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
db357aa3b80b4e083a5965e9653a1c9a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db357aa3b80b4e083a5965e9653a1c9a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
db357aa3b80b4e083a5965e9653a1c9a_JaffaCakes118
Size
653KB
MD5
db357aa3b80b4e083a5965e9653a1c9a
SHA1
79d3d31ed919d5274db77224b170c2b650929258
SHA256
1acb70240220ade853159706889bf59db532f36efe65f99e0dea10855bfd1a69
SHA512
85a33954d954e9e4efe1dd94f7ff6a427de6a97b3b6181c9efd53ef21505d6ae15f47fbf71d8cfac8467ba511b2d24440133bb7f6dfa7510ba9319ba40a8daed
SSDEEP
6144:PgwsYARhJR3Y9u6onqwl2dtlhlCWGUeRvuT2nmzTiQ4NLpvv4iX62:cTJRDhnq48tljC7VNEUmzjiLl
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
E:\BuildSource\6\WindowsClient\WindowsClient.Client.RC\Binaries\Win32\Release Sonar\InstallBootStrapper.pdb
CreateToolhelp32Snapshot
GlobalSize
SetFileTime
ResetEvent
SetThreadPriority
GetExitCodeThread
SetEndOfFile
GetEnvironmentVariableW
Process32FirstW
FreeLibrary
GetSystemDirectoryW
LoadLibraryW
WaitForMultipleObjects
GetModuleHandleW
GetProcAddress
CreateMutexA
TerminateThread
GetFileAttributesExW
GetTempFileNameW
SetEnvironmentVariableW
Process32NextW
MoveFileW
CreateFileW
WriteFile
ResumeThread
GetTickCount
GetExitCodeProcess
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
ReleaseMutex
CreateMutexW
SetEvent
CreateProcessW
WaitForSingleObject
CreateEventW
CreateDirectoryW
GetLastError
GetCurrentThreadId
HeapAlloc
LocalAlloc
MultiByteToWideChar
GetProcessHeap
HeapFree
GetComputerNameW
lstrlenW
LocalFree
FlushInstructionCache
GetCurrentProcess
CloseHandle
lstrcatW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
LeaveCriticalSection
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
InitializeCriticalSection
DeleteCriticalSection
InterlockedCompareExchange
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
HeapDestroy
HeapReAlloc
HeapSize
InterlockedIncrement
ReleaseSemaphore
InterlockedDecrement
InterlockedExchangeAdd
Sleep
WideCharToMultiByte
UnmapViewOfFile
MapViewOfFile
GetTimeZoneInformation
OpenProcess
SetFileAttributesW
FileTimeToDosDateTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetLocalTime
ReadFile
SetFilePointer
GetFileSize
GetFileInformationByHandle
GlobalAlloc
GlobalFree
lstrlenA
IsBadReadPtr
GetCurrentThread
GlobalReAlloc
GlobalUnlock
GlobalLock
CreateSemaphoreW
lstrcpynW
lstrcpyW
GetModuleFileNameW
DuplicateHandle
CreateFileA
CreateFileMappingW
lstrcpyA
ProcessIdToSessionId
GetCurrentProcessId
OpenFileMappingW
GetFileAttributesW
ExpandEnvironmentStringsW
GetComputerNameExW
FindNextFileA
FindFirstFileA
lstrcpynA
GetSystemTime
GetSystemDefaultLangID
SetLastError
GetTempPathW
CopyFileW
RemoveDirectoryW
GetVolumeNameForVolumeMountPointW
GetVolumeInformationW
lstrcmpiW
CompareStringW
FormatMessageW
lstrcmpW
MulDiv
GlobalHandle
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetCommandLineA
GetSystemTimeAsFileTime
ExitThread
CreateThread
HeapCreate
FatalAppExitA
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetConsoleCtrlHandler
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetLocaleInfoW
CompareStringA
SetEnvironmentVariableA
EnterCriticalSection
GetVersionExW
RaiseException
UnregisterClassA
GetParent
GetWindowThreadProcessId
MapDialogRect
SetWindowContextHelpId
EndDialog
CharNextW
GetDesktopWindow
CharUpperW
wsprintfW
CharLowerBuffW
SetWindowPos
BeginPaint
ScreenToClient
OffsetRect
RedrawWindow
DestroyAcceleratorTable
ClientToScreen
MoveWindow
GetClassInfoExW
RegisterClassExW
InvalidateRgn
DialogBoxIndirectParamW
IsChild
RegisterWindowMessageW
CreateAcceleratorTableW
SystemParametersInfoW
GetWindowRect
GetCursorPos
GetClassNameW
ReleaseDC
SetWindowLongW
SendMessageW
DefWindowProcW
GetWindowLongW
CharLowerW
DestroyWindow
CallWindowProcW
MessageBoxW
DispatchMessageW
MapWindowPoints
GetWindow
LoadCursorW
EndPaint
SetWindowTextW
InvalidateRect
GetClientRect
PtInRect
GetDlgItem
FillRect
SetCursor
ShowWindow
SetFocus
UpdateWindow
MessageBeep
CreateWindowExW
SetRectEmpty
IsWindowEnabled
SetCapture
GetSysColor
GetCapture
MsgWaitForMultipleObjects
IsDlgButtonChecked
ReleaseCapture
DrawTextW
PostMessageW
PeekMessageW
GetActiveWindow
GetFocus
SetDlgItemTextW
GetDlgCtrlID
GetWindowTextLengthW
DrawFocusRect
TranslateMessage
GetWindowTextW
GetDC
CheckDlgButton
IsWindow
CryptHashData
AdjustTokenPrivileges
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
ConvertSidToStringSidW
LookupAccountNameW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetKeySecurity
LookupAccountSidW
CryptReleaseContext
CryptDestroyKey
InitiateSystemShutdownExW
GetSidSubAuthority
GetSidSubAuthorityCount
SetTokenInformation
DuplicateTokenEx
IsValidSid
RegOpenKeyW
RegGetKeySecurity
GetTokenInformation
RevertToSelf
OpenThreadToken
ImpersonateLoggedOnUser
CryptEncrypt
CryptDecrypt
CryptDestroyHash
CryptDeriveKey
LookupPrivilegeValueW
CryptCreateHash
RegEnumKeyExW
CryptAcquireContextW
CryptGetHashParam
SetNamedSecurityInfoW
RegEnumValueW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
ConvertStringSidToSidW
SHGetFolderPathW
ShellExecuteW
OleLockRunning
OleInitialize
CoSetProxyBlanket
OleUninitialize
CreateStreamOnHGlobal
StringFromCLSID
CoGetClassObject
CoTaskMemAlloc
CLSIDFromProgID
StringFromGUID2
CLSIDFromString
CoTaskMemFree
CoInitializeEx
CoUninitialize
GetHGlobalFromStream
CoCreateInstance
SystemTimeToVariantTime
SafeArrayPutElement
SafeArrayDestroy
SafeArrayRedim
SafeArrayAccessData
SafeArrayUnaccessData
CreateErrorInfo
SetErrorInfo
VariantChangeType
GetErrorInfo
SafeArrayCreateVector
SysStringByteLen
VarBstrCat
VarBstrCmp
VarBstrFromI4
SafeArrayGetElement
VariantInit
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SysStringLen
SysFreeString
VarI4FromStr
SysAllocStringByteLen
SafeArrayCreate
VariantClear
SysAllocStringLen
SysAllocString
PathRemoveFileSpecW
PathSkipRootA
PathFileExistsW
PathIsDirectoryW
PathFindExtensionW
PathFindFileNameW
PathMatchSpecA
PathAppendA
PathFindFileNameA
PathRemoveFileSpecA
PathIsDirectoryA
PathSkipRootW
PathAppendW
SHCreateStreamOnFileW
PathMatchSpecW
InitCommonControlsEx
DestroyPropertySheetPage
PropertySheetW
CreatePropertySheetPageW
_TrackMouseEvent
UuidToStringW
UuidFromStringW
UuidCreate
RpcStringFreeW
UuidFromStringA
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
WTSQuerySessionInformationW
WTSOpenServerW
WTSCloseServer
WTSFreeMemory
NetApiBufferFree
NetWkstaUserEnum
GetModuleFileNameExW
InstallHinfSectionW
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetDeviceCaps
GetStockObject
GetObjectW
CreateFontW
CreateFontIndirectW
SetBkMode
SetTextColor
CreateSolidBrush
DeleteDC
SetBkColor
DeleteObject
SelectObject
GetAdaptersInfo
?SendRemoteHttpRequest@CProxy@@QAEJPAGJPAUtagVARIANT@@1J10@Z
?Open@CProxy@@QAEJHPAX@Z
??0CProxy@@QAE@H@Z
??1CProxy@@QAE@XZ
Install
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ