Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
7510dd49f7f43346f06026f297ef7466_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7510dd49f7f43346f06026f297ef7466_JaffaCakes118.dll
Resource
win10v2004-20240426-en
Target
7510dd49f7f43346f06026f297ef7466_JaffaCakes118
Size
946KB
MD5
7510dd49f7f43346f06026f297ef7466
SHA1
4dab99489e25c06adf25d6dbf8b3104721501513
SHA256
239c3487925ba09c2ce28e8014d860d2d20898603a0bddddf86b9101d9c29924
SHA512
058ea7e4f9c75011253aa26a1a2ab2800aa9b3fa8413200d9409fdf427965d7ad000339a2f38490e0d10cd9db46c0b2c83f5b0b6e12274ea223a557e85acea2e
SSDEEP
12288:QQqHL7nPbyjR0AJzjEjCzRXmIicuYJbCrh8DExaTcsfcymiHo:QQqHnbEXzjE4R2IlQh8QgTeiHo
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
AccessibleObjectFromWindow
CoInternetGetSession
URLDownloadToCacheFileA
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetCrackUrlA
inet_ntoa
WSAStartup
WSACleanup
gethostbyname
SetLastError
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
GetLastError
GetFileSize
GetFileSizeEx
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
CloseHandle
GetSystemTimeAsFileTime
ExpandEnvironmentStringsA
CreateDirectoryA
CreateFileA
LocalFree
GetModuleHandleA
CreateThread
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
SetEvent
ReleaseMutex
WaitForSingleObject
WaitForMultipleObjects
Sleep
FindClose
lstrcpyA
CreateMutexA
OpenMutexA
CreateEventA
FindFirstFileA
FindNextFileA
FindFirstChangeNotificationA
LocalAlloc
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersion
OpenProcess
InitializeCriticalSection
EncodePointer
DecodePointer
DisableThreadLibraryCalls
LoadResource
SizeofResource
lstrcmpiA
GetCurrentProcessId
RaiseException
GetModuleHandleW
FindResourceA
IsDBCSLeadByte
VirtualProtect
GetOEMCP
GetACP
IsValidCodePage
HeapSize
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
GetCPInfo
GetCommandLineA
VirtualQuery
GetSystemInfo
IsProcessorFeaturePresent
IsDebuggerPresent
AreFileApisANSI
HeapReAlloc
GetLocalTime
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
GetStringTypeW
VirtualFree
VirtualAlloc
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetProcessHeap
HeapFree
HeapAlloc
lstrlenA
GetConsoleCP
GetConsoleMode
GetCurrentProcess
FlushInstructionCache
OutputDebugStringA
DebugBreak
GetModuleFileNameA
GetCurrentThreadId
GetFileType
SetFilePointerEx
MoveFileExW
GetTimeZoneInformation
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
SetStdHandle
WriteConsoleW
ReadConsoleW
CreateFileW
LoadLibraryExA
CallWindowProcA
CharNextA
GetClassInfoExA
CreateWindowExA
UnregisterClassA
BringWindowToTop
DefWindowProcA
LoadStringA
GetKeyboardState
AllowSetForegroundWindow
RegisterClassExA
keybd_event
GetWindowTextA
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
GetDesktopWindow
LoadCursorA
PostMessageA
CharLowerA
GetWindowThreadProcessId
SendMessageA
AttachThreadInput
SetWindowPos
GetForegroundWindow
SetForegroundWindow
GetWindowRect
GetParent
FindWindowA
FindWindowExA
UnhookWindowsHookEx
DestroyIcon
MessageBoxA
SendMessageTimeoutA
CharNextW
SetTimer
KillTimer
RegisterWindowMessageA
IsWindow
IsWindowVisible
CreatePopupMenu
GetMenuItemCount
InsertMenuA
DeleteMenu
TrackPopupMenuEx
GetMenuItemInfoA
GetClassNameA
SystemParametersInfoA
LookupPrivilegeValueA
RegOpenKeyExA
RegQueryValueExA
OpenProcessToken
RegEnumValueA
RegSetValueExA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
AdjustTokenPrivileges
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
RegCloseKey
SHFileOperationA
ShellExecuteA
ShellExecuteExA
SHGetFolderPathA
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CoGetClassObject
CoInitializeEx
CoUninitialize
CoCreateGuid
CLSIDFromProgID
CoTaskMemRealloc
CoTaskMemFree
VariantCopy
VariantChangeType
SysAllocStringLen
DispCallFunc
UnRegisterTypeLi
RegisterTypeLi
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantClear
VariantInit
SysStringLen
SysFreeString
SysAllocString
UrlEscapeA
GdiplusShutdown
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ