Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
1064d90563366053e2d439877c1d2f05_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1064d90563366053e2d439877c1d2f05_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
1064d90563366053e2d439877c1d2f05_JaffaCakes118
Size
277KB
MD5
1064d90563366053e2d439877c1d2f05
SHA1
718005201422e246dc8ba051a61f31df91748692
SHA256
729ebdc21afec738ca467402cb25799060f634272c1c85f5459edfb1d4091dff
SHA512
760cd15ca7aebaa54b6b2dd5773a1ac87def5c9e41317ada841eee12718075cb6045e6b1cadd0fd14fb57af7b7ec5f33a1df5f50d399be592bc79c9cef68a1cf
SSDEEP
6144:KyODQo4emuWkA9zDwhfUZLjvbWIEIboD5yiGQ:KyODQo4XX5DwhGLjXorGQ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetPrinterA
GetJobA
OpenPrinterA
EnumPrintersA
ClosePrinter
EnumJobsA
GetPrinterA
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?end@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEPADXZ
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEPADXZ
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?find_first_not_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?find_last_not_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@IIABV?$allocator@D@1@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?empty@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE_NXZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDIABV?$allocator@D@1@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?_Xlen@std@@YAXXZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
_mbsicmp
_ftol
strncpy
localtime
gmtime
_winmajor
_mbslwr
memcmp
time
malloc
__dllonexit
_onexit
_initterm
_adjust_fdiv
_mbsstr
_mbschr
_itoa
_snprintf
strtoul
strtod
_atoi64
_ultoa
_i64toa
_purecall
_mbscmp
_except_handler3
_mbclen
_mbsinc
atoi
_ismbcdigit
wcslen
_mbsnbcmp
_vsnprintf
_mbsrchr
strcat
__CxxFrameHandler
free
_mbctoupper
_mbctolower
printf
_beginthreadex
memset
??2@YAPAXI@Z
_mbsnbcpy
strcpy
strlen
sprintf
memcpy
_mbsnbicmp
?Instance@CLogImpl@@SAPAV1@XZ
?GetContext@CLogImpl@@QAEPAU_ContextBlock@@IHI@Z
?Log@CLogImpl@@QAAPADPBDZZ
?AddLog@CLogImpl@@QAEHPAU_ContextBlock@@PBDH@Z
closesocket
htonl
ntohl
ioctlsocket
WSACleanup
gethostbyname
WSAStartup
htons
socket
sendto
inet_addr
SHDeleteKeyA
PathIsNetworkPathA
GetComputerNameExA
SetComputerNameA
SetComputerNameExA
GetCommandLineW
GlobalFree
SetLastError
TerminateProcess
WaitForSingleObjectEx
GetExitCodeProcess
CreateProcessA
GetEnvironmentVariableA
CreateToolhelp32Snapshot
Process32First
GetSystemDefaultLCID
GetSystemDefaultLangID
GetVersionExA
GetModuleHandleA
GlobalMemoryStatusEx
Sleep
DeviceIoControl
IsBadStringPtrA
WriteProcessMemory
VirtualProtectEx
VirtualAllocEx
ResumeThread
SetThreadContext
FlushInstructionCache
GetThreadContext
SuspendThread
CreateProcessW
GetComputerNameA
CreateRemoteThread
GetLastError
OutputDebugStringA
CloseHandle
SetEvent
OpenEventA
OpenProcess
DeleteFileA
SetFileAttributesA
GetFileAttributesA
CopyFileA
GetTempPathA
QueryDosDeviceA
GetSystemDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
GetCurrentThreadId
WaitForSingleObject
CreateEventA
GlobalAddAtomA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
WriteFile
CreateFileA
ReadFile
GetFileSize
GetCurrentProcess
GetTickCount
GetSystemTime
SetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
ReadFileEx
WriteFileEx
GetOverlappedResult
SetFilePointer
FlushFileBuffers
SetEndOfFile
CopyFileExA
MoveFileExA
MoveFileA
RemoveDirectoryA
CreateDirectoryA
GetSystemWindowsDirectoryA
GetModuleFileNameA
GetTempFileNameA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetCommandLineA
ReadProcessMemory
GetCurrentProcessId
Process32Next
GetModuleFileNameExA
GetProcessMemoryInfo
GetMappedFileNameA
EnumProcessModules
CommandLineToArgvW
ShellExecuteExA
ShellExecuteA
CreateEnvironmentBlock
DestroyEnvironmentBlock
NetApiBufferFree
NetGetJoinInformation
NetUnjoinDomain
NetWkstaGetInfo
NetServerGetInfo
Netbios
NetQueryDisplayInformation
NetLocalGroupEnum
NetJoinDomain
NetRenameMachineInDomain
CoCreateGuid
RpcStringFreeA
UuidFromStringA
UuidToStringA
GetIfEntry
GetAdaptersInfo
SetupDiDestroyDeviceInfoList
CM_Get_DevNode_Status
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiGetDeviceRegistryPropertyA
WNetAddConnection2A
WNetCancelConnection2A
OpenProcessToken
RegCreateKeyA
RegFlushKey
RegDeleteValueA
RegDeleteKeyA
RegNotifyChangeKeyValue
RegEnumValueA
RegSetValueExA
ImpersonateLoggedOnUser
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AdjustTokenPrivileges
LookupPrivilegeValueA
CreateProcessAsUserA
GetTokenInformation
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
SetTokenInformation
DuplicateTokenEx
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RevertToSelf
RegisterHotKey
TranslateMessage
KillTimer
SetTimer
GetSystemMetrics
GetMessageA
LoadStringA
DispatchMessageA
UnregisterHotKey
PostThreadMessageA
DisablePolicy
PNPDllFini
PNPDllInit
PrtAudit
PrtCheckProcess
PrtResetPolicy
PrtSaveBKDirName
PrtSetPolicy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ