Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
180726c24ff47107d1b349b7f9b096d9_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
180726c24ff47107d1b349b7f9b096d9_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
180726c24ff47107d1b349b7f9b096d9_JaffaCakes118
Size
122KB
MD5
180726c24ff47107d1b349b7f9b096d9
SHA1
a9fa5eb3ba31fbf4a85603b2fdbb75452dcd16f1
SHA256
28018652fbe53764648e104c36b908d3914e3460891aad13702bb52fc679155a
SHA512
8f584601f82eba63406acd4b307d8cd07dd041c1978f3709f612278b4e72884921ab9fe150ce25d51bbf6cadc44b11bf603dfc131c041e20c2457742f8302168
SSDEEP
3072:/O9Oaul3SmYW9IR0btxL4Os/5/M1Km9vGdXfel1Nv:/O9AlimjxL4lxEQ2bljv
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
GetModuleHandleA
GetProcAddress
VirtualProtect
GetKeyboardType
RegQueryValueExA
SysFreeString
GetPixel
WSACleanup
InternetReadFile
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JSOff
JSOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ