Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
0c256fe3871e2a2236c6ea204b87dee7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c256fe3871e2a2236c6ea204b87dee7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
0c256fe3871e2a2236c6ea204b87dee7_JaffaCakes118
Size
283KB
MD5
0c256fe3871e2a2236c6ea204b87dee7
SHA1
f67a88121865154bbb298802230d1a46767afaf0
SHA256
a6d4f5c60429a0afcffb8bc512c948a20be354704382ca78f3beeb1e58b4e711
SHA512
a8e08489d980d79b7b56dba71985817062990eb3c8357bd53db760a92e9c4af8c153be4bfbdbe6f14af6451ca3ed1b7b4168e23c44e72d3d06e6c910f0c52b95
SSDEEP
6144:5Hjt83Qhwq//GXfjv98K0YeS3H0KVIMBPoYExhYKgY:jiQ2DemP7Y
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImageDirectoryEntryToData
IsBadCodePtr
TerminateThread
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
IsBadReadPtr
VirtualProtect
SetLastError
FindClose
FindNextFileA
FindFirstFileA
OpenProcess
GlobalFree
GlobalAlloc
WriteFile
GetFileSize
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVolumeInformationA
MoveFileExA
SetFileAttributesA
LocalFree
LocalAlloc
GetCurrentThread
Module32Next
GetLocalTime
SetErrorMode
VirtualFreeEx
GetExitCodeThread
WinExec
GetCommandLineA
CreateDirectoryA
GetFileAttributesA
RemoveDirectoryA
TerminateProcess
IsBadWritePtr
GetShortPathNameA
RaiseException
CloseHandle
GetLastError
CreateMutexA
WaitForSingleObject
GetPrivateProfileStringA
CopyFileA
GetPrivateProfileSectionA
GetTickCount
ReleaseMutex
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
ReadFile
CreateFileA
lstrcatA
lstrcpyA
SizeofResource
LoadResource
FindResourceA
Sleep
InterlockedDecrement
lstrlenA
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
FreeLibrary
LoadLibraryA
InterlockedExchange
WritePrivateProfileStringA
GetVersionExA
DeviceIoControl
SetFilePointer
GetTempPathA
DeleteFileA
GetCurrentProcessId
GetACP
GetTempFileNameA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
HeapDestroy
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetEnvironmentVariableA
GetWindowsDirectoryA
GetSystemDirectoryA
VirtualQuery
GetSystemDefaultLangID
UpdateWindow
SetCursor
SetCapture
ReleaseCapture
IsWindowVisible
SystemParametersInfoA
GetSysColor
DrawEdge
InflateRect
CopyRect
DrawTextA
SetRect
FillRect
PeekMessageA
SetWindowLongW
DefWindowProcW
CallWindowProcW
GetAncestor
GetKeyState
SetPropA
ReplyMessage
InSendMessage
GetMessageA
TranslateMessage
DispatchMessageA
KillTimer
PtInRect
SetTimer
GetPropA
RemovePropA
GetWindowThreadProcessId
IsWindowUnicode
CharUpperA
GetWindowTextW
SetWindowTextA
GetWindowTextLengthA
GetWindowTextA
IsWindowEnabled
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
UnregisterClassA
CharUpperBuffA
GetDesktopWindow
GetClassNameA
GetMenu
GetClientRect
GetDC
ReleaseDC
InvalidateRect
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
SetWindowPos
IsWindow
GetParent
SetFocus
GetFocus
IsChild
DestroyWindow
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
DefWindowProcA
CharNextA
GetForegroundWindow
DialogBoxParamA
MessageBoxA
IsDlgButtonChecked
EndDialog
BeginPaint
EndPaint
LoadIconA
DrawIcon
GetSystemMetrics
SetForegroundWindow
ShowWindow
CharLowerA
PostMessageA
GetClassNameW
GetWindowTextLengthW
LoadStringA
SendMessageA
CreateRectRgnIndirect
RestoreDC
DeleteDC
SetViewportOrgEx
SetWindowOrgEx
SetMapMode
SaveDC
LPtoDP
GetDeviceCaps
CreateDCA
DeleteObject
SelectObject
SetTextColor
SetBkMode
Rectangle
CreateSolidBrush
LineTo
MoveToEx
CreatePen
GetStockObject
GetTextMetricsA
RegDeleteValueA
CloseServiceHandle
OpenSCManagerA
RegSetValueA
RegQueryValueA
RegCreateKeyA
OpenThreadToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegFlushKey
ControlService
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
RegOpenKeyA
RegEnumKeyA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
UrlGetPartA
SHEnumValueA
StrStrA
SHEnumKeyExA
PathFindFileNameA
StrStrIA
SHDeleteEmptyKeyA
SHDeleteKeyA
SHSetValueA
SHGetValueA
SHDeleteValueA
StrCatBuffA
memset
_snprintf
strncpy
strrchr
strcpy
strlen
strcat
__CxxFrameHandler
fopen
_vsnprintf
fprintf
fclose
malloc
_beginthreadex
free
strcmp
sscanf
_except_handler3
sprintf
time
strstr
isalnum
??3@YAXPAX@Z
memcpy
fwrite
_mbsstr
wcscpy
atoi
_mbspbrk
strchr
_strnicmp
memmove
memcmp
strncmp
realloc
??2@YAPAXI@Z
_purecall
atol
localtime
strncat
fgets
fseek
_mbsnbcpy
strtok
abs
_ftol
_strlwr
_mbsrchr
rewind
_tempnam
_onexit
?terminate@@YAXXZ
_initterm
_adjust_fdiv
_stricmp
_CxxThrowException
__dllonexit
??1type_info@@UAE@XZ
Netbios
ControlPanel
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ