Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
4543ba590df92e7a98e7c357640a7c46_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4543ba590df92e7a98e7c357640a7c46_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
4543ba590df92e7a98e7c357640a7c46_JaffaCakes118
Size
290KB
MD5
4543ba590df92e7a98e7c357640a7c46
SHA1
f143634b1556e47aa93b422c8fc1024cfbded6c5
SHA256
16cf3adc1d896b9a6269c8ed1e6a4d230c498048bc7fc00cf68ab245ed4a26c2
SHA512
74faed1de33b9a6c18d9f7ca9931ce9839f5ec027cf428da4058559db04a410a5c13e62ee37c973f021f07b4e443d8bccdd19f10061fb284c8a110d443f75ccd
SSDEEP
3072:d1MnJTmhy6uOsgnPjdTpeEv9iqNMO+smzUCC+L+dSi6GQu67:d1MJTWu7gP5Tpz+RsmzceDu2
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
LoadLibraryW
GetProcAddress
CloseHandle
GetModuleHandleW
CreateFileW
FreeLibrary
ReadFile
GetVersionExW
SetFilePointer
InitializeCriticalSectionAndSpinCount
ExpandEnvironmentStringsW
LoadLibraryA
FlushFileBuffers
ReadConsoleW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetLastError
WideCharToMultiByte
GetCurrentProcess
MultiByteToWideChar
GetConsoleCP
OutputDebugStringW
LoadLibraryExW
HeapReAlloc
GetOEMCP
IsValidCodePage
GetACP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
Sleep
HeapFree
GetCommandLineA
GetCurrentThreadId
HeapAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
GetCPInfo
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
GetModuleHandleExW
HeapSize
GetStdHandle
WriteFile
GetModuleFileNameW
GetProcessHeap
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
RegisterWindowMessageW
SendMessageTimeoutW
UnhookWindowsHookEx
SetWindowsHookExW
CallNextHookEx
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
SHGetFolderPathW
ord165
CoTaskMemFree
PathAppendW
PathRemoveFileSpecW
PathAppendA
PathRemoveFileSpecA
PathStripPathW
GetProcessImageFileNameW
SetProcessList
StartWinHook
StopWinHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ