Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
1bbe1fb2cb61fb139f3208e01d02c2cc_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1bbe1fb2cb61fb139f3208e01d02c2cc_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
1bbe1fb2cb61fb139f3208e01d02c2cc_JaffaCakes118
Size
90KB
MD5
1bbe1fb2cb61fb139f3208e01d02c2cc
SHA1
bdd5bd0a65990052cb843c6ae9bb0c521f78bef5
SHA256
db46e486bb86a8436385f0cda16c4c42838899ade6f1078690b5bc2bc3b967fa
SHA512
13d395b6ced5b70f55803b4e63323b8ebbc4e40952c3f6d34fb203cebee8f4690ada09514c72c8adb4a0b193f5a84ddfb742f463ae28b4dd1def78330f67b84b
SSDEEP
1536:mYWG58WVMvbGwWB/K3EZtA0rGo++7PGLFE7zCV4iDC90wL:ZWGBVMvbqZN7eLFE7+4RX
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
GetProcAddress
LoadLibraryA
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
CreateFileA
ReadFile
WriteFile
SetFilePointer
GetFileTime
SetFileTime
GetFileAttributesA
MoveFileA
DeleteFileA
SetFileAttributesA
GetFileSize
CreateDirectoryA
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
HeapCreate
GetWindowsDirectoryA
SearchPathA
GetCurrentProcessId
VirtualProtect
VirtualQuery
LocalFree
SetLastError
GetSystemDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetDriveTypeA
GetCommandLineA
CreateFileMappingA
DuplicateHandle
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
DebugBreak
HeapReAlloc
HeapFree
LockResource
FormatMessageA
CreateProcessA
GetVersionExA
GetSystemInfo
HeapAlloc
DisableThreadLibraryCalls
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FindResourceA
LoadResource
CreateMutexA
SizeofResource
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
InterlockedIncrement
lstrcmpA
GetTickCount
lstrcatA
GetLastError
lstrcmpiA
MultiByteToWideChar
lstrcpyA
lstrlenA
lstrlenW
WideCharToMultiByte
WaitForSingleObject
ReleaseMutex
CloseHandle
CompareStringA
GetDC
ReleaseDC
InvalidateRect
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
SetWindowPos
IsWindow
GetParent
SetFocus
GetFocus
EndPaint
LoadCursorA
RegisterClassExA
CreateWindowExA
CallWindowProcA
DefWindowProcW
GetClientRect
BeginPaint
EnumWindows
GetClassNameA
wsprintfA
CharNextA
DefWindowProcA
DestroyWindow
ShowWindow
SetWindowLongA
GetWindowLongA
GetWindowThreadProcessId
PostMessageA
PeekMessageA
GetDesktopWindow
GetWindowRect
AdjustWindowRect
LoadStringA
UnregisterClassA
GetKeyboardType
GetWindowLongW
SetWindowLongW
CallWindowProcW
GetClassInfoExA
IsChild
CreateDCA
GetDeviceCaps
LPtoDP
SaveDC
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
RestoreDC
CreateRectRgnIndirect
CryptGetUserKey
CryptEncrypt
CryptImportKey
CryptExportKey
CryptGenKey
CryptDeriveKey
CryptSignHashA
RegCreateKeyA
RegFlushKey
RegQueryValueExA
GetUserNameA
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
CryptDecrypt
SHGetDesktopFolder
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
CreateOleAdviseHolder
CoCreateInstance
OleRegGetMiscStatus
OleRegGetUserType
OleRegEnumVerbs
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringByteLen
SysAllocStringByteLen
VariantClear
VariantInit
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
RegisterTypeLi
OleCreatePropertyFrame
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ