Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
34818ce171ea150b91429ac1dd6fbe49_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
34818ce171ea150b91429ac1dd6fbe49_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
34818ce171ea150b91429ac1dd6fbe49_JaffaCakes118
Size
170KB
MD5
34818ce171ea150b91429ac1dd6fbe49
SHA1
765f7cea9ae6e126181e5a78b897304913530d4d
SHA256
502386cb2288ce85af522da55916b5a05c71d9a32a80cec396bc4cdd0e0ac665
SHA512
e44b009eef9710787ddf63d5038e15112969ef5ac952520f772b5ab78dfe57c42f7562044642f573c9480c76569ef9a7912cc5cd1b0472e4d61c25e79a03bfb0
SSDEEP
3072:xUiScf7Taa44mVg6zMe4sfPZfE8dreM9aSW3OKojVbc7n4CRWLvSFlp6+qvv1:xUUm4mG6zwQLaM9aKjRg0SLlK1
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
GetModuleHandleA
CreateFileW
lstrcpyW
lstrlenW
GetWindowsDirectoryW
AreFileApisANSI
BeginUpdateResourceW
BuildCommDCBAndTimeoutsA
BuildCommDCBAndTimeoutsW
CloseHandle
CompareStringA
CompareStringW
CopyFileW
CreateDirectoryExW
CreateDirectoryW
CreateJobObjectW
CreateMailslotW
CreateSemaphoreW
CreateToolhelp32Snapshot
DefineDosDeviceA
DeleteVolumeMountPointA
DeviceIoControl
DuplicateHandle
EnumCalendarInfoExA
EnumCalendarInfoExW
EnumResourceLanguagesW
EnumResourceTypesW
EnumSystemCodePagesW
FatalAppExitA
FileTimeToLocalFileTime
FillConsoleOutputCharacterA
FindFirstFileExW
FindNextVolumeMountPointA
FindNextVolumeW
FindResourceExA
FlushFileBuffers
FoldStringA
FormatMessageW
GenerateConsoleCtrlEvent
GetAtomNameA
GetAtomNameW
GetCommMask
GetCompressedFileSizeW
GetConsoleCP
GetConsoleOutputCP
GetDiskFreeSpaceExA
GetExitCodeThread
GetFileAttributesA
ExitProcess
GetLocaleInfoA
GetNumberOfConsoleMouseButtons
GetOEMCP
GetStartupInfoW
GetStdHandle
GetTapeStatus
GetThreadContext
GetTimeFormatW
GetVersionExA
GetWindowsDirectoryA
GlobalUnfix
HeapFree
IsBadCodePtr
IsDebuggerPresent
IsValidLanguageGroup
LoadLibraryExW
LocalLock
LocalShrink
MapViewOfFile
Module32FirstW
OpenEventA
OpenWaitableTimerA
Process32Next
PulseEvent
ReadConsoleA
ReadConsoleOutputCharacterA
ReadConsoleOutputW
RtlFillMemory
SearchPathW
SetCommTimeouts
SetComputerNameA
SetComputerNameExA
SetFileTime
SetInformationJobObject
SetLocalTime
SetSystemTimeAdjustment
SetTapeParameters
SetThreadExecutionState
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualFreeEx
VirtualLock
WritePrivateProfileSectionA
WriteProfileStringW
_llseek
lstrcpyA
lstrcpyn
lstrcpynW
lstrlen
GetLocalTime
VirtualAlloc
CascadeChildWindows
CharLowerA
CharNextA
CharUpperA
CharUpperBuffW
ChildWindowFromPointEx
CloseClipboard
CloseWindow
CopyAcceleratorTableA
CopyImage
CountClipboardFormats
CreateIconIndirect
DdeConnectList
DdeEnableCallback
DeferWindowPos
DestroyMenu
DlgDirListA
DlgDirListComboBoxA
DlgDirListComboBoxW
DrawEdge
DrawFocusRect
DrawFrame
DrawStateA
DrawStateW
EmptyClipboard
EnumWindows
FindWindowExA
GetAltTabInfo
GetAncestor
GetCapture
GetCaretBlinkTime
GetClassInfoW
GetClassLongA
GetClipCursor
GetClipboardViewer
GetDialogBaseUnits
GetDlgItemInt
GetKeyboardLayoutNameW
GetLastActivePopup
GetMenuItemID
GetMenuItemRect
GetMenuStringW
GetMessageW
GetParent
GetProcessDefaultLayout
GetScrollRange
GetWindow
GrayStringA
HideCaret
HiliteMenuItem
IMPQueryIMEW
InsertMenuW
IsWindowVisible
KillTimer
LoadCursorFromFileW
LoadMenuIndirectW
LoadStringA
LockSetForegroundWindow
MenuItemFromPoint
MessageBoxIndirectA
OemToCharBuffW
PostMessageW
PostQuitMessage
PostThreadMessageW
RealGetWindowClass
RedrawWindow
RegisterClassW
RegisterDeviceNotificationA
RemoveMenu
ReplyMessage
SendDlgItemMessageW
SendMessageTimeoutA
SendNotifyMessageA
SendNotifyMessageW
SetDebugErrorLevel
SetDlgItemTextW
SetDoubleClickTime
SetMenuItemInfoA
SetParent
SetRectEmpty
SetUserObjectInformationA
SetUserObjectInformationW
SetWindowLongW
SetWindowWord
SetWindowsHookA
SetWindowsHookW
ShowScrollBar
SystemParametersInfoA
TabbedTextOutA
ToAsciiEx
TranslateAccelerator
UpdateLayeredWindow
WINNLSGetIMEHotkey
WindowFromPoint
LoadIconA
BroadcastSystemMessageW
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ