Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
4f191085577d62b1d5fb1b195fbdb014_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4f191085577d62b1d5fb1b195fbdb014_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
4f191085577d62b1d5fb1b195fbdb014_JaffaCakes118
Size
3.0MB
MD5
4f191085577d62b1d5fb1b195fbdb014
SHA1
ef3117bedf5d8e029099c43fdd55ca754e7102b8
SHA256
52172adaf1aa646bb756721b8311313de8ce33ca70d8182616f231beffae9d76
SHA512
0156e1bf93bf83e14e20b0f07da0ef1c9516e9ff54ced1118c2f29257866b20562c3d980ebf8373b81c286ebe1bc0c1fb3e144821898f0da64b561120c3df9b1
SSDEEP
49152:LBxZSFvxuCTFbtvX0xjKbv5n9D9lehTJyDM6:YuCTX+e5NS0
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
ext.pdb
_fileno
localeconv
mbtowc
__mb_cur_max
_iob
_snprintf
_itoa
wctomb
iswctype
isleadbyte
memset
__badioinfo
__pioinfo
_isatty
_lseeki64
ungetc
_ismbblead
?terminate@@YAXXZ
_onexit
wcstombs
__dllonexit
_unlock
_lock
??1type_info@@UEAA@XZ
__C_specific_handler
_initterm
_amsg_exit
_XcptFilter
abort
memcmp
__crtCompareStringA
___lc_collate_cp_func
islower
__crtLCMapStringA
___lc_codepage_func
___lc_handle_func
__pctype_func
memcpy
setlocale
_CxxThrowException
_callnewh
??0exception@@QEAA@AEBQEBDH@Z
__CxxFrameHandler
_errno
fwrite
_mbsnbicmp
_mbsninc
fclose
fread
fscanf
feof
rewind
ftell
fseek
fopen
_ltoa
atof
isupper
toupper
wcschr
towlower
wcstod
tolower
printf
calloc
wcstok
ispunct
??0bad_cast@@QEAA@PEBD@Z
??1bad_cast@@UEAA@XZ
??0bad_cast@@QEAA@AEBV0@@Z
_strrev
_close
_write
_open
wcstoul
??_V@YAXPEAX@Z
_msize
wcsrchr
_strupr
qsort
_strcmpi
_strlwr
iswprint
wcsstr
_wcsnicmp
isprint
isdigit
_strdup
strpbrk
time
ctime
localtime
isspace
_vsnwprintf
getenv
_vscwprintf
wcsncpy
_snwprintf
iswdigit
strtoul
wcsncmp
isxdigit
strtol
strstr
_wtoi
_strnicmp
_strtoui64
strncmp
atoi
strtok
_vsnprintf
malloc
free
strrchr
strchr
realloc
memchr
_wcsicmp
_purecall
_stricmp
?what@exception@@UEBAPEBDXZ
memmove
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBD@Z
_read
??3@YAXPEAX@Z
log10
OpenEventLogA
ReportEventA
CloseEventLog
DebugCreate
ImageNtHeader
FindExecutableImageEx
SymFindFileInPath
GetTimeZoneInformation
GetLocalTime
LoadLibraryExW
GetProcAddress
GetLastError
FreeLibrary
GetCurrentProcessId
QueryPerformanceCounter
OutputDebugStringA
RtlVirtualUnwind
RtlLookupFunctionEntry
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlCaptureContext
DecodePointer
EncodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualProtect
SetLastError
FormatMessageA
MapViewOfFile
CreateFileMappingA
GetThreadLocale
FindFirstFileA
GetModuleHandleA
GetModuleFileNameW
FindClose
FindNextFileW
FindFirstFileW
CreateFileW
ReadFile
GetFileSize
RaiseException
GetUserGeoID
DebugBreak
HeapAlloc
HeapReAlloc
DeleteFileA
Sleep
GetTickCount
GetCurrentThreadId
CopyFileA
CreateDirectoryA
ExpandEnvironmentStringsA
WriteFile
SetEndOfFile
SetFilePointer
UnmapViewOfFile
LoadLibraryA
HeapFree
GetProcessHeap
CloseHandle
CreateFileA
LocalAlloc
LocalFree
FileTimeToLocalFileTime
GetComputerNameA
SystemTimeToFileTime
lstrcmpA
FileTimeToSystemTime
GetLocaleInfoA
GetSystemTimeAsFileTime
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ShellExecuteA
DebugExtensionInitialize
DebugExtensionNotify
DebugExtensionUninitialize
_EFN_DbAddCrashDirect
_EFN_ExtDllQueryDataByTag
_EFN_FindSrInfo
_EFN_GetDataFromXml
_EFN_GetDebugFailureAnalysis
_EFN_GetFailureAnalysis
_EFN_GetTargetInfo
_EFN_GetTriageFollowupFromSymbol
_EFN_ReloadTriager
addrbias
address
analyze
analyzeuexception
asd
bft
chkallimg
chkimg
cppexr
cpuid
createsprivateheap
cxr
dblob
ddstack
dml_proc
doescallhsi
dumpfa
dumptype
eflags
elog_str
error
exchain
exr
fi
findgifs
findjpegs
findjpgs
findpngs
findthebuild
findxmldata
fis
for_each_frame
for_each_function
for_each_local
for_each_module
for_each_process
for_each_register
for_each_thread
frame
framesize
frlo
gle
gs
gsfriendlyinit
hashblob
hashcmdresults
hbdna
heap
heapcorruption
help
imggp
imgreloc
imports
inframe
inmodule
inthread
irop
iscomobject
isgsprotectedfunc
ismanagedmod
isnxcompat
isregobjptr
isresourceonly
istruncatedmodpointer
kup
list
ltoo
net_send
obja
opcodemap
owner
pooltag
r
recursive
rtlavl
ruleinfo
sel
showexports
showimports
showresources
solvebucket
std_map
str
targetinfo
threads
ticket
trap
tss
u
ufs
url
usbdata
usesaslr
usesbannedapi
usessafeseh
ustr
whatdllnotfound
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ