Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
42926e2018af2a1066d289179109c006_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
42926e2018af2a1066d289179109c006_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
42926e2018af2a1066d289179109c006_JaffaCakes118
Size
125KB
MD5
42926e2018af2a1066d289179109c006
SHA1
eaac5ca6573806492fd374136790e78e4bc846e7
SHA256
e24996014b457393164191b27764594cf591baa0f27efd5f14e4f2388611586d
SHA512
4b3c4601240fb8cf1ba6d1423264cb38204264c3dd1b3cf933e332489767d47ffe393d42e84097c9d82140e5916298e0fadbb2ebb823ec2dc30c6bd6198e86cf
SSDEEP
3072:PdkoJpLPSpf/L/haWm2yI7v0LFVqGINuOVF2zYxSxWwPV8UiGP6Y+:r7bQx7v0LXqrYOVNwxW2Ja
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
GetModuleHandleA
GetProcAddress
VirtualProtect
GetKeyboardType
RegQueryValueExA
SysFreeString
GetPixel
WSACleanup
InternetReadFile
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JSOff
JSOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ