Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
8c86fac349ea1290018de72b2ee4ac34_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8c86fac349ea1290018de72b2ee4ac34_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
8c86fac349ea1290018de72b2ee4ac34_JaffaCakes118
Size
777KB
MD5
8c86fac349ea1290018de72b2ee4ac34
SHA1
15c6186745eecc80b56ac1f96b11e5622d2557af
SHA256
201054f6d869cbfcdfe71f8e8215ce921b3ddd0779c18b297b57e854cce161bc
SHA512
894020b8f1efa2760fad47b9514989191e38c702b966c693fcdbfe9ddc68ba6a60404b2c0609c819d883000a28c4da23936fba0e0be64c27b48676cbcdfd1dd5
SSDEEP
12288:PmO7Tud0H2b0R/95Ux8DoBpGT0qRH624wzUa:PmOG2H2oRPNoBMTj//
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
CoInternetGetSession
InternetReadFile
HttpOpenRequestA
InternetCloseHandle
InternetOpenA
HttpSendRequestA
InternetConnectA
InternetSetOptionA
InternetQueryOptionA
inet_ntoa
WSAStartup
WSACleanup
gethostbyname
GetCurrentProcess
RaiseException
GetCurrentThreadId
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetDiskFreeSpaceA
GetProcAddress
LoadLibraryA
CreateFileA
FindNextFileA
GetLastError
GetFileSize
GetFileSizeEx
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
FindClose
CloseHandle
GetSystemTimeAsFileTime
ExpandEnvironmentStringsA
CreateDirectoryA
GetFileAttributesA
FindFirstFileA
LocalFree
GetModuleHandleA
GetCurrentProcessId
GetFileType
CreateThread
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetMailslotInfo
MultiByteToWideChar
SetEvent
ReleaseMutex
WaitForSingleObject
WaitForMultipleObjects
Sleep
PeekNamedPipe
lstrcpyA
lstrlenA
CreateMutexA
OpenMutexA
CreateEventA
DeleteFileA
FindFirstChangeNotificationA
LocalAlloc
FreeLibrary
OpenProcess
TerminateProcess
GetVersion
SizeofResource
InitializeCriticalSection
FlushInstructionCache
EncodePointer
DecodePointer
DisableThreadLibraryCalls
lstrcmpiA
LoadLibraryExA
GetModuleFileNameA
GetModuleHandleW
FindResourceA
IsDBCSLeadByte
VirtualProtect
GetACP
IsValidCodePage
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
GetCPInfo
GetCommandLineA
VirtualQuery
GetSystemInfo
IsProcessorFeaturePresent
IsDebuggerPresent
AreFileApisANSI
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
GetStringTypeW
VirtualFree
VirtualAlloc
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
LoadResource
LockResource
GetOEMCP
GetConsoleCP
GetConsoleMode
GetTickCount
OpenThread
WideCharToMultiByte
FindResourceExW
GetTimeZoneInformation
FindResourceW
MoveFileExW
SetEnvironmentVariableA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
SetFilePointerEx
SetStdHandle
WriteConsoleW
CreateFileW
ReadConsoleW
GetVersionExA
InsertMenuA
GetKeyboardState
CreatePopupMenu
DeleteMenu
UnregisterClassA
BringWindowToTop
GetClassNameA
TrackPopupMenuEx
IsWindowVisible
keybd_event
GetMenuItemCount
GetWindowThreadProcessId
GetWindowTextA
SystemParametersInfoA
AllowSetForegroundWindow
IsWindow
DefWindowProcA
CallWindowProcA
RegisterClassExA
GetClassInfoExA
CreateWindowExA
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
GetDesktopWindow
LoadCursorA
PostMessageA
GetMenuItemInfoA
SendMessageA
AttachThreadInput
SetWindowPos
GetForegroundWindow
SetForegroundWindow
GetWindowRect
GetParent
FindWindowA
FindWindowExA
UnhookWindowsHookEx
DestroyIcon
MessageBoxA
SendMessageTimeoutA
CharNextA
CharNextW
SetTimer
KillTimer
RegisterWindowMessageA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueA
RegSetValueExA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
OpenProcessToken
RegCloseKey
SHFileOperationA
ShellExecuteA
ShellExecuteExA
SHGetFolderPathA
CoUninitialize
CoInitializeEx
CoGetClassObject
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
CoCreateGuid
CoTaskMemRealloc
CoTaskMemFree
CLSIDFromProgID
VariantCopy
VariantChangeType
SysAllocStringLen
DispCallFunc
UnRegisterTypeLi
RegisterTypeLi
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantClear
VariantInit
SysStringLen
SysAllocString
SysFreeString
UrlEscapeA
GdiplusShutdown
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ