Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0f1b44eaa333ccca5308faa9ed5c8422_JaffaCakes118.dll
Resource
win7-20240508-en
Target
0f1b44eaa333ccca5308faa9ed5c8422_JaffaCakes118
Size
59KB
MD5
0f1b44eaa333ccca5308faa9ed5c8422
SHA1
04a633e00679bd600566bdabb754b6f5ff5cee48
SHA256
48b0ffb70b5f89b91bbe4cc3393cd86bd58d3d59e8c261694619d5a18baaf372
SHA512
ebf0866b804cc3222e5e44f8ca23eed8183cd61c9e39c34c4e0c97494685b8ef3c0a543fb01626cf92dd092c9e723ae3a8823a13ebd7fe5154be3ab1eacb6de1
SSDEEP
1536:XJrxTQHRslEMf8vkJ58/9e41J34mB4rmC90z:XJdTQVMlJaesJomB4rz
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegFlushKey
RegQueryValueExA
DeleteCriticalSection
lstrcmpiA
LeaveCriticalSection
EnterCriticalSection
lstrcpyW
WideCharToMultiByte
lstrlenW
GetCurrentProcessId
VirtualProtect
VirtualQuery
FlushInstructionCache
GetCurrentProcess
lstrlenA
InitializeCriticalSection
CloseHandle
CreateEventA
DisableThreadLibraryCalls
WaitForSingleObject
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
GetSystemDirectoryA
lstrcmpA
DebugBreak
HeapReAlloc
HeapFree
UnmapViewOfFile
MapViewOfFile
SetLastError
GetCurrentThreadId
ReleaseMutex
CreateMutexA
LocalFree
CreateFileMappingA
SizeofResource
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
VariantChangeTypeEx
VariantInit
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VariantClear
GetWindowThreadProcessId
GetFocus
GetWindowTextW
SendMessageA
SetWindowsHookExA
UnhookWindowsHookEx
EnumWindows
DefWindowProcW
CallWindowProcW
CallWindowProcA
SetWindowLongA
SetWindowLongW
IsWindowUnicode
GetWindowLongA
GetWindowLongW
CharNextA
GetKeyboardType
FindWindowExA
MapWindowPoints
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
DefWindowProcA
CreateWindowExA
CallNextHookEx
GetKeyState
SetWindowTextA
SetFocus
SetWindowTextW
GetPropA
SetPropA
RemovePropA
PostMessageA
IsWindow
RegisterWindowMessageA
GetWindow
GetClassNameA
GetParent
PeekMessageA
DestroyWindow
UnregisterClassA
WSACancelAsyncRequest
WSAStartup
WSAAsyncGetHostByName
WSACleanup
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ