Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
e1786cd629bbef005f56efac362f45f3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1786cd629bbef005f56efac362f45f3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
e1786cd629bbef005f56efac362f45f3_JaffaCakes118
Size
271KB
MD5
e1786cd629bbef005f56efac362f45f3
SHA1
578a124e8d9a21b7285779fbd2ddf411cc9324c0
SHA256
922fdca7872a3793341c985609bab2b952bc1c12c36d66ba8e8a08a98f09a6c7
SHA512
e3c76245027ef4ccf3216000da34680c18de291e7947682442f3d6fd4fa47833bd651dc1192fb0c1590ef15e0fe7ccc7582051bc24b5d65818492c7bd828544d
SSDEEP
3072:T6Qx2GP6vk38dSk+fv2BDz2W+sgfpJ2klFCTYkQN1NMW7SC9m4NGzCj1E4VpAvl:T6Qx3P39kLBdilFYGVIos4VpAN
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
SHGetMalloc
SHGetSpecialFolderPathA
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
CreateDirectoryA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
MoveFileExA
GetDriveTypeA
DeleteFileA
SetFileAttributesA
FreeLibrary
GetProcAddress
CloseHandle
GetCurrentProcess
TerminateProcess
OpenProcess
CreateProcessA
MoveFileA
WideCharToMultiByte
lstrlenW
HeapAlloc
GetProcessHeap
HeapFree
LoadLibraryA
WritePrivateProfileStringA
DeviceIoControl
CreateFileA
IsBadReadPtr
GetLastError
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetTempFileNameA
lstrlenA
Sleep
GetWindowsDirectoryA
WaitForSingleObject
LockResource
SizeofResource
LoadResource
FindResourceA
WriteFile
GetPrivateProfileStringA
GetPrivateProfileIntA
ReadFile
IsBadWritePtr
FindNextFileA
MultiByteToWideChar
lstrcmpiA
GetACP
CreateFileMappingA
GetFileSize
FlushFileBuffers
InterlockedDecrement
LocalFree
LocalAlloc
GetTickCount
SearchPathA
GetVersionExA
GetFileAttributesA
FindClose
FindFirstFileA
GetShortPathNameA
GetLongPathNameA
GetCurrentDirectoryA
GetModuleFileNameA
VirtualQuery
ExpandEnvironmentStringsA
GetTempPathA
GetSystemDirectoryA
CreateThread
wsprintfA
MessageBoxA
SendMessageTimeoutA
GetWindowTextA
SendMessageA
EnumWindows
DialogBoxParamA
EndDialog
SendDlgItemMessageA
GetDlgItem
PostMessageA
LoadStringA
GetTopWindow
EnumChildWindows
GetDesktopWindow
ChangeServiceConfigA
RegEnumKeyExA
RegSetValueExA
GetTokenInformation
LookupAccountSidA
RegEnumKeyA
RegCreateKeyExA
RegQueryValueExA
QueryServiceStatus
OpenSCManagerA
OpenServiceA
ControlService
StartServiceA
CloseServiceHandle
RegOpenKeyExA
RegOpenKeyA
RegEnumValueA
RegDeleteValueA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CoCreateInstance
CoInitialize
CoUninitialize
OleRun
SysFreeString
VariantInit
SysAllocString
VariantChangeType
VariantClear
SysAllocStringByteLen
SysStringByteLen
SHGetValueA
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
SHEnumValueA
SHEnumKeyExA
WSCGetProviderPath
WSCDeinstallProvider
WSCEnumProtocols
_read
_open
_tell
_lseek
time
isprint
strftime
localtime
_mbsstr
fwrite
_except_handler3
_local_unwind2
??1type_info@@UAE@XZ
__dllonexit
_initterm
_adjust_fdiv
_onexit
?terminate@@YAXXZ
_strnicmp
_strlwr
_CxxThrowException
_wcsicmp
_close
_stricmp
strcpy
realloc
_mbsicmp
_mbslwr
_strdup
fgets
atoi
memcmp
vsprintf
fputs
strcmp
memmove
_snprintf
_mbscmp
_mbsnbicmp
memcpy
_filelength
malloc
fread
free
_mbsrchr
__CxxFrameHandler
memset
strrchr
strchr
strlen
strstr
strncat
strcat
_mbsnbcpy
_mbschr
strncpy
fclose
ftell
fprintf
fseek
fopen
_vsnprintf
??2@YAPAXI@Z
GetAdaptersInfo
ord17
CheckIntegrity
CloseAllMessenger
DllRegisterServer
Events
ExecFunc
Invoke
Property
Rundll32
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ