Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0dff761f574ff8d44c76a45952552089_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dff761f574ff8d44c76a45952552089_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
0dff761f574ff8d44c76a45952552089_JaffaCakes118
Size
92KB
MD5
0dff761f574ff8d44c76a45952552089
SHA1
4b2448ebd127af8efa8f2d3920a4a2c93b5bfc13
SHA256
ca6f476669e8c0202720574c6ae607517fd28430ee2101c8096ac8a6a8765d14
SHA512
b631a5e6a959ce925a5956347f31aae7b579afa8fca3efab4643def6fafe392cd2213dbcff6c736d22cdb1d728ddb4bbed705fec2055982eb1541a14ec054a37
SSDEEP
1536:WYWG58WVMvbGwWB/K3EZtA0rGo++PPGQ7e7zCV4i/C90B:JWGBVMvbqZNPeQ7e7+4x
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
GetProcAddress
LoadLibraryA
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
CreateFileA
ReadFile
WriteFile
SetFilePointer
GetFileTime
SetFileTime
GetFileAttributesA
MoveFileA
DeleteFileA
SetFileAttributesA
GetFileSize
CreateDirectoryA
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
HeapCreate
GetWindowsDirectoryA
SearchPathA
GetCurrentProcessId
VirtualProtect
VirtualQuery
LocalFree
SetLastError
GetSystemDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetDriveTypeA
GetCommandLineA
CreateFileMappingA
DuplicateHandle
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
DebugBreak
HeapReAlloc
HeapFree
LockResource
FormatMessageA
CreateProcessA
GetVersionExA
GetSystemInfo
HeapAlloc
DisableThreadLibraryCalls
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FindResourceA
LoadResource
CreateMutexA
SizeofResource
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
InterlockedIncrement
lstrcmpA
GetTickCount
lstrcatA
GetLastError
lstrcmpiA
MultiByteToWideChar
lstrcpyA
lstrlenA
lstrlenW
WideCharToMultiByte
WaitForSingleObject
ReleaseMutex
CloseHandle
CompareStringA
GetDC
ReleaseDC
InvalidateRect
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
SetWindowPos
IsWindow
GetParent
SetFocus
GetFocus
EndPaint
LoadCursorA
RegisterClassExA
CreateWindowExA
CallWindowProcA
DefWindowProcW
GetClientRect
BeginPaint
EnumWindows
GetClassNameA
wsprintfA
CharNextA
DefWindowProcA
DestroyWindow
ShowWindow
SetWindowLongA
GetWindowLongA
GetWindowThreadProcessId
PostMessageA
PeekMessageA
GetDesktopWindow
GetWindowRect
AdjustWindowRect
LoadStringA
UnregisterClassA
GetKeyboardType
GetWindowLongW
SetWindowLongW
CallWindowProcW
GetClassInfoExA
IsChild
CreateDCA
GetDeviceCaps
LPtoDP
SaveDC
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
RestoreDC
CreateRectRgnIndirect
CryptGetUserKey
CryptEncrypt
CryptImportKey
CryptExportKey
CryptGenKey
CryptDeriveKey
CryptSignHashA
RegCreateKeyA
RegFlushKey
RegQueryValueExA
GetUserNameA
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
CryptDecrypt
SHGetDesktopFolder
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
CreateOleAdviseHolder
CoCreateInstance
OleRegGetMiscStatus
OleRegGetUserType
OleRegEnumVerbs
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringByteLen
SysAllocStringByteLen
VariantClear
VariantInit
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
RegisterTypeLi
OleCreatePropertyFrame
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ