Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
270c53aef3268d29730e79e352d06002_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
270c53aef3268d29730e79e352d06002_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
270c53aef3268d29730e79e352d06002_JaffaCakes118
Size
69KB
MD5
270c53aef3268d29730e79e352d06002
SHA1
704ee1eab51bbbfed8de95e7a6e1cd31fc329d38
SHA256
a9896833dafacf2888b65f29467993a444a54c4ca7aaee2d99793ec1540d4fe7
SHA512
b8d48303ab369b47a40de9144e658d525318f0471f7ecedf4f1057d6d19d7b8999232bf85300d7cd091fda796725ff1441a3781142adc2920310fa8ce491c09f
SSDEEP
1536:zlNqhCVSYPeLWHTVdghuGDu+r0q4nftgZcu6IhUlnsw:zlIhCLPJHT8Rf4nfEcu6IhUhsw
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Netbios
GetCurrentProcessId
lstrcpyA
DisableThreadLibraryCalls
GetModuleFileNameA
InterlockedIncrement
InterlockedDecrement
lstrcpynA
lstrcatA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
OutputDebugStringA
CreateFileA
GetProcAddress
LoadLibraryA
VirtualProtect
ResetEvent
WaitForSingleObject
ReadFile
GetSystemDirectoryA
WriteFile
SetFilePointer
GetCurrentProcess
DuplicateHandle
GetFileSize
lstrcmpiA
SetFileAttributesA
lstrcmpA
GetLocalTime
CreateEventA
SetEvent
CreateThread
OpenEventA
GetTempPathA
GetCommandLineW
FindClose
FindNextFileA
FindFirstFileA
CreateRemoteThread
Module32Next
Module32First
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
GetExitCodeProcess
Sleep
TerminateProcess
OpenProcess
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
lstrlenA
GetLastError
WideCharToMultiByte
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
DeleteFileA
EnumWindows
GetWindowThreadProcessId
EnumChildWindows
SetWindowLongA
SetForegroundWindow
GetClassNameA
CharNextA
FindWindowExA
wvsprintfA
SetWindowTextA
wsprintfA
CallWindowProcA
SendMessageA
FindWindowA
GetClientRect
GetWindowLongA
GetWindowTextA
RegCloseKey
InitializeSecurityDescriptor
InitializeAcl
LookupAccountNameA
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegOpenKeyA
RegSetKeySecurity
RegEnumValueA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
SHGetFolderPathA
CommandLineToArgvW
ShellExecuteA
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
StringFromGUID2
CoTaskMemAlloc
SysStringLen
LoadRegTypeLi
VarUI4FromStr
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
PathFindExtensionA
wnsprintfA
SHDeleteKeyA
SHSetValueA
SHGetValueA
WSACleanup
gethostbyname
send
socket
htons
inet_addr
connect
closesocket
WSAStartup
??2@YAPAXI@Z
strchr
strlen
sprintf
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
__CppXcptFilter
__security_error_handler
_strlwr
_stricmp
??_U@YAPAXI@Z
realloc
wcsncpy
__CxxFrameHandler
strstr
strrchr
_purecall
??_V@YAXPAX@Z
??3@YAXPAX@Z
memset
_CxxThrowException
memcpy
_except_handler3
_resetstkoflw
free
malloc
memcmp
AfxFindMemoryInSky
AfxReplaceText
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ