Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0f0f2fe43a3ab3dcf07a685035ff81b9_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0f0f2fe43a3ab3dcf07a685035ff81b9_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
0f0f2fe43a3ab3dcf07a685035ff81b9_JaffaCakes118
Size
51KB
MD5
0f0f2fe43a3ab3dcf07a685035ff81b9
SHA1
78fa51d50c124ef46eeeb22f7f8d189c637da69e
SHA256
948a5b2bcb54b4df916e4dbb53a5fee949b99f87011032e841efc6accf38897e
SHA512
5dec4156b2c3cfe09c7196a76a401a38ea3c64937a7af0174c94673524c98884a5cc4f907007a3599aabb98322edf3d9885940767e227d5b862475a7265c55cf
SSDEEP
768:l3sWyv8CikBBxfZRqdV56HCEIr5xmFDx5JiSzjBbC90L:qW+BXAgH+rorJiQdC90
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumValueA
CreateDIBSection
GetObjectA
DeleteObject
BitBlt
SelectObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
ExtTextOutA
SetBkColor
GetRgnBox
GetDIBits
lstrlenA
GetVersionExA
IsBadReadPtr
lstrcmpiA
GetModuleHandleA
VirtualProtect
VirtualQuery
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetProcAddress
lstrcpyA
EnterCriticalSection
FreeLibrary
DisableThreadLibraryCalls
HeapAlloc
GetSystemInfo
HeapCreate
InterlockedIncrement
InterlockedDecrement
HeapDestroy
MultiByteToWideChar
lstrcatA
WideCharToMultiByte
lstrlenW
GetModuleFileNameA
LoadLibraryExA
GetSystemTimeAsFileTime
CloseHandle
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetShortPathNameA
SizeofResource
LoadResource
FindResourceA
GetLastError
lstrcpynA
IsDBCSLeadByte
FlushInstructionCache
GetCurrentProcess
DebugBreak
HeapReAlloc
HeapFree
LoadLibraryA
LocalFree
CoTaskMemRealloc
CoTaskMemFree
CLSIDFromString
CoCreateInstance
CoTaskMemAlloc
VariantChangeTypeEx
VariantInit
SysFreeString
SysAllocString
LoadTypeLi
RegisterTypeLi
VariantClear
IsWindowUnicode
ReleaseDC
GetDC
SetPropA
BeginPaint
EndPaint
RemovePropA
GetPropA
GetWindowLongA
WindowFromDC
CallWindowProcW
CallWindowProcA
DefWindowProcW
SetWindowLongA
SetWindowLongW
GetWindowLongW
CharNextA
GetSysColor
SendMessageA
InvalidateRect
FindWindowExA
GetWindowThreadProcessId
GetClassNameA
GetParent
UpdateWindow
IsRectEmpty
wsprintfA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ