Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0ed026cfd963a24441bcbb9a45a0c1cc_JaffaCakes118.dll
Resource
win7-20240419-en
Target
0ed026cfd963a24441bcbb9a45a0c1cc_JaffaCakes118
Size
337KB
MD5
0ed026cfd963a24441bcbb9a45a0c1cc
SHA1
a0cba199ca7d9ac4286aa57341d238510b12bd46
SHA256
89f295e3f67f0d1787dff3c18d74764fb354c09ad6ade10544577dfedc25e83d
SHA512
0f14e8fdbb4c7ab7de0b0d4350a2ab65afe9f2ee64104b4a45d36f42a2dc98b9916204e93324077a8d97d238cafec788c975247f621dcfc9ec763e13029b9a0b
SSDEEP
6144:pgOXktvhhOU35RJEesNr3wU7HuAmHKmlEwrPmRPWEpWFn2E6lyD2:7kvhhOKJETRByqTwr03pdfl
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
VirtualAlloc
VirtualProtect
GetProcAddress
lstrcmpA
lstrlenA
midiInReset
VarCyInt
GetWindowRgn
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE