Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
41681bbaa01ed0225be87761a984be70_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
41681bbaa01ed0225be87761a984be70_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
41681bbaa01ed0225be87761a984be70_JaffaCakes118
Size
130KB
MD5
41681bbaa01ed0225be87761a984be70
SHA1
b5cf803b9f0de6d1e5a1025c9c208748a81e2f4b
SHA256
6b59da12c4bad67cd0cfc4f9a485d639aa5d412017765a6efe6134e50c98c26d
SHA512
4a443859faccc21aa3e00baa98cb37bf6abb25afba486d6aaf64af0df8ccd1be8774c0514a2ed77e06677e71c9d6bf46af87bcf9a309b2968ff51f45ab3c9d32
SSDEEP
3072:xUP0yM7GIrJQx7BkELtqZE7sy9uf9rx7hyq9RPSXB1YeL:x8lM7GmJQJpcZesy9w99tyq9BSXB1YS
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
GetModuleHandleA
GetProcAddress
VirtualProtect
GetKeyboardType
RegQueryValueExA
SysFreeString
SetPixel
WSACleanup
InternetReadFile
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ