Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a22bd091766cf0f85332da1a760c7aff_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a22bd091766cf0f85332da1a760c7aff_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
a22bd091766cf0f85332da1a760c7aff_JaffaCakes118
Size
243KB
MD5
a22bd091766cf0f85332da1a760c7aff
SHA1
3d02835582bd995ef693c8b994c4e67acc7ffe4f
SHA256
cfadc6b20106980b14ffc7d6f8f5e0566f9509ce0bbe3f9f0fc17bb4848f23fa
SHA512
af55af14fd6cc76abc2dee619fd459853c31c16ccd56d9c3b87e51dff641095103845f24301bfb0de9b8f82ba26906370ebd4af0aa095df21c8a0a6379c0bad7
SSDEEP
3072:sbGdbHwQTSk8UZ/V1bZQXFxfmE/vN2OMxpWvMOZ9GJkYrjpANSD5MbvARLkrJD4m:sw0exoFxJ/VxMSvdZ9zseYQvk07pS1I
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\DistributedAutoLink\Temp\CompileOutputDir\localopt.pdb
lstrlenW
RaiseException
GetLastError
GetProcAddress
EnterCriticalSection
lstrcmpiW
DeleteCriticalSection
DeviceIoControl
GetVersionExW
CreateFileA
CloseHandle
LoadLibraryW
GetWindowsDirectoryW
lstrcpynW
CreateFileW
GetFileSize
ReadFile
DeleteFileW
GetFileAttributesW
GetPrivateProfileStringW
WritePrivateProfileStringW
OutputDebugStringW
WaitForSingleObject
GetExitCodeThread
GetCommandLineW
WriteFile
CreateProcessW
OpenProcess
FileTimeToSystemTime
Sleep
LockResource
MultiByteToWideChar
GetVersion
GetShortPathNameW
WritePrivateProfileSectionW
SetFileAttributesW
RemoveDirectoryW
CopyFileW
MoveFileExW
CreateDirectoryW
FindFirstFileW
FindNextFileW
FindClose
lstrcpyW
SetEvent
InitializeCriticalSectionAndSpinCount
CreateEventW
WaitForMultipleObjects
GetDiskFreeSpaceExW
GetDriveTypeW
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetModuleFileNameW
LeaveCriticalSection
SizeofResource
InitializeCriticalSection
GetModuleHandleW
InterlockedDecrement
InterlockedIncrement
LoadLibraryExW
LoadResource
FreeLibrary
FindResourceW
FindResourceExW
lstrlenA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoA
LoadLibraryA
GetModuleHandleA
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCurrentThreadId
CreateThread
GetSystemTimeAsFileTime
GetCommandLineA
HeapCreate
VirtualFree
VirtualAlloc
ExitProcess
GetStdHandle
CharUpperW
SendMessageW
CharNextW
GetWindowThreadProcessId
EnumChildWindows
FindWindowW
IsWindow
CharUpperA
wsprintfW
EnumWindows
GetWindowRect
GetForegroundWindow
RegCreateKeyW
RegOpenKeyW
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
RegEnumValueW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
CoCreateInstance
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
OleUninitialize
CoInitialize
CoInitializeSecurity
StringFromGUID2
CoUninitialize
VarUI4FromStr
SysAllocString
VariantClear
VariantInit
SafeArrayDestroy
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
VarBstrCat
SysAllocStringLen
SysStringLen
VariantChangeType
SysFreeString
VariantCopy
UuidCreate
InternetCloseHandle
InternetOpenUrlW
InternetOpenW
InternetReadFile
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ