Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
340943a24e88100b517190643aa486e0_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
340943a24e88100b517190643aa486e0_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
340943a24e88100b517190643aa486e0_JaffaCakes118
Size
291KB
MD5
340943a24e88100b517190643aa486e0
SHA1
baa265df17ec865fdb70d8be980be45aaa00301c
SHA256
4423c27dd98f5d9e87e503d67418906ccff582c3a1803a139a964e5087ebc805
SHA512
8ad5f3c4614a4989df3b023083c63c276ceb908f6c93bffed28c51cf54bf36d7a312b9296153f4f8a05d2d71dd25f6cee493f48fd1cc3ef4c25a2a62761a449a
SSDEEP
6144:1jUSNJYSv027nERBD4TytRrGl4/NjQrFNzm3dV9:Fd287ERBD5Fm4mzm3dj
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
RemoveDirectoryW
CreateMutexA
FindNextFileW
ReleaseMutex
CloseHandle
GetTempPathA
DeleteFileA
CreateFileA
lstrcpynA
HeapAlloc
GetCurrentProcess
HeapFree
GetProcessHeap
GetDriveTypeA
InitializeCriticalSection
GetVolumeInformationA
LeaveCriticalSection
EnterCriticalSection
GetFullPathNameA
GetFileAttributesA
FileTimeToSystemTime
FindFirstFileA
GetFileType
FindClose
FileTimeToLocalFileTime
GetVersion
FindNextFileA
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
lstrlenA
lstrcmpiA
DosDateTimeToFileTime
SetVolumeLabelA
SetFilePointer
GetLocaleInfoA
SetEndOfFile
SystemTimeToFileTime
SetFileTime
SetFileAttributesA
GetLocalTime
LocalFileTimeToFileTime
lstrcpyA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLastError
GetTempPathW
MultiByteToWideChar
CopyFileW
WideCharToMultiByte
WaitForSingleObject
CreateDirectoryW
MoveFileExW
FindFirstFileW
RemoveDirectoryA
CreateDirectoryA
GetFileTime
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
SetEnvironmentVariableW
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetSystemTimeAsFileTime
MoveFileA
SetStdHandle
GetFileInformationByHandle
PeekNamedPipe
HeapReAlloc
RtlUnwindEx
GetCurrentThreadId
FlsSetValue
GetCommandLineA
RaiseException
RtlPcToFileHeader
HeapSetInformation
HeapCreate
HeapDestroy
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
EncodePointer
DecodePointer
FlsGetValue
FlsFree
SetLastError
FlsAlloc
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
ReadFile
GetCurrentDirectoryA
SetCurrentDirectoryA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LoadLibraryA
HeapSize
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
OemToCharA
CharToOemA
GetSecurityDescriptorGroup
IsValidSecurityDescriptor
GetSecurityDescriptorSacl
IsValidSid
GetSecurityDescriptorOwner
SetKernelObjectSecurity
GetSecurityDescriptorControl
IsValidAcl
AdjustTokenPrivileges
GetSecurityDescriptorLength
LookupPrivilegeValueA
GetKernelObjectSecurity
OpenProcessToken
GetSecurityDescriptorDacl
FreeUnzipBuf
GetDllVersionA
PrepareUnzipFile
SetZipLevel
UnZip
UnZip2
UnZipEx
UnZipEx2
UnZipFile
ZipFolder
ZipFolderEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ