Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
e1358edf2fe03f756c41953d23c2c79e_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e1358edf2fe03f756c41953d23c2c79e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
e1358edf2fe03f756c41953d23c2c79e_JaffaCakes118
Size
250KB
MD5
e1358edf2fe03f756c41953d23c2c79e
SHA1
917ba9887bc1d36bf273c542bd7229710af9625c
SHA256
ddb3c104827fbfa25fd85ff4d0964439c4b91b6b36fca03ccc0e682316d651f5
SHA512
e3ac242292ecc66b884825c04f7746c30bd1c2ed781fbefcbc664591f8852fbd7d63543d7bf47161e9c207c276050dd9b7d237ef35c6002b9b42c0431ba10fc7
SSDEEP
6144:9zvGasLxZlSweLSHbKH6igvBR0LaKVq08dObr5wCFjlIcW:tvZKxX0eHbTJVwqrir5OV
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\work\7d7d086a33af7025\BUILDSENG\Release\x86\aswArDll.pdb
SetFilePointer
WritePrivateProfileStringW
GetSystemTimeAsFileTime
DuplicateHandle
DeviceIoControl
lstrcpynW
DeleteFileA
GetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
CreateFileA
ReadFile
GetCurrentThread
GetVersionExW
GetTempPathW
FindFirstFileW
FindNextFileW
FindClose
GetModuleFileNameW
GetTempFileNameW
GetCurrentThreadId
GetTickCount
MultiByteToWideChar
WriteFile
OpenThread
SuspendThread
CopyFileW
GetCommandLineA
GetModuleHandleA
CreateProcessW
GetFileSize
SearchPathW
FreeLibrary
VirtualAlloc
VirtualFree
CallNamedPipeA
SetFilePointerEx
GetWindowsDirectoryA
SearchPathA
VirtualProtect
SetLastError
RaiseException
GetSystemInfo
VirtualQuery
LoadLibraryExW
GetProcessTimes
InitializeSListHead
GetCurrentProcessId
CreateFileW
DeleteFileW
GetPrivateProfileIntW
GetModuleHandleW
GetProcAddress
GetCurrentProcess
DisableThreadLibraryCalls
GetPrivateProfileStringW
GetSystemDirectoryW
CreateThread
Sleep
GetFileAttributesW
GetLocalTime
SetEvent
WaitForSingleObject
ExpandEnvironmentStringsW
GetWindowsDirectoryW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CloseHandle
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetSystemTimes
ExitWindowsEx
RegEnumKeyExW
RegFlushKey
RegEnumValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyW
RegOpenKeyW
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
RegQueryValueExW
RegOpenKeyExW
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
ImpersonateSelf
OpenThreadToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
IIDFromString
?_Xlength_error@std@@YAXPBD@Z
__std_exception_copy
__std_exception_destroy
_CxxThrowException
memcpy
memmove
strchr
_except_handler4_common
__std_type_info_destroy_list
wcsrchr
strstr
strrchr
memset
__CxxFrameHandler3
__std_terminate
wcschr
wcsstr
wcsncat_s
strncmp
_strnicmp
_wcslwr
wcsncpy_s
wcsnlen
_wcsnicmp
strncpy
iswdigit
_wcsicmp
_stricmp
towlower
iswalpha
wcscpy_s
wcsncmp
wcsncpy
_wcsdup
toupper
_close
fread
_open
fclose
_wfopen_s
fseek
__stdio_common_vswprintf_p
__stdio_common_vsprintf
_get_osfhandle
_write
_read
_lseeki64
fgetpos
__stdio_common_vswprintf
fsetpos
realloc
_callnewh
free
malloc
wcstoul
_itow_s
_wtof
_wtoi64
atoi
_execute_onexit_table
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
_cexit
_initterm
_invalid_parameter_noinfo_noreturn
_initterm_e
_errno
_invalid_parameter_noinfo
terminate
getenv
_localtime64
__timezone
_tzset
_time64
wcsftime
setlocale
_waccess_s
_except1
??0InputFile@@QAE@ABU0@@Z
??0InputFile@@QAE@PAU_iobuf@@_J@Z
??0InputFile@@QAE@PAXK_J@Z
??0InputFile@@QAE@PB_W@Z
??0InputFile@@QAE@XZ
??1InputFile@@UAE@XZ
??4InputFile@@QAEAAU0@ABU0@@Z
??_7InputFile@@6B@
?CloseFile@InputFile@@QAEHXZ
?EnsureData@InputFile@@QAEKK_JH@Z
?EnsureOpenFile@InputFile@@QAEHXZ
?GetDataLength@InputFile@@QBEKXZ
?GetDataOffset@InputFile@@QBE_JXZ
?GetFileSize@InputFile@@QAE_JXZ
?GetFileSize@InputFile@@SAHPAU_iobuf@@PA_J@Z
?GetInitialized@InputFile@@QBEHXZ
?GetPointerToData@InputFile@@QBEPAXK@Z
?Initialize@InputFile@@QAEHPAU_iobuf@@_J@Z
?Initialize@InputFile@@QAEHPAXK_J@Z
?Initialize@InputFile@@QAEHPB_W@Z
?ReadData@InputFile@@QAEKK_JPAXH@Z
?Release@InputFile@@UAEXXZ
aswARDllMain
aswarBoot
aswarCleanBootSector
aswarClose
aswarCrippleExecutableFile
aswarDeleteFile
aswarDisableService
aswarGetActivatedFeatures
aswarGetExcludeFolders
aswarGetProgress
aswarGetProgress2
aswarGetScanCookie
aswarInit
aswarNukeFile
aswarReadFile
aswarRestartSystem
aswarRunCommand
aswarScanBootSectors
aswarScanFiles
aswarScanFull
aswarScanProcesses
aswarScanQuick
aswarScanRegistry
aswarScanRegistry_CurrentUser
aswarScanRegistry_LocalMachine
aswarScanServices
aswarScanSuperQuick
aswarScanUEFI
aswarSetExcludeFolders
aswarSetScanCookie
aswarSetStopEvent
aswarSetWorkHandle
aswarVer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ