Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
59edc983e52851d195e7c61e8efad602_JaffaCakes118.dll
Resource
win7-20240705-en
Target
59edc983e52851d195e7c61e8efad602_JaffaCakes118
Size
179KB
MD5
59edc983e52851d195e7c61e8efad602
SHA1
1dc1ee794381fa1b5acce47edb051208336d8d1e
SHA256
5afa252752ab6ed4df37b46833cb35274c3755da48d73171f352caee9ba3a30e
SHA512
e78e75ccbd86b2e887a95e6f6c0d904c9d1b75de9c83d2a3419165541b2120435e8ddb322b8d5c5463f97f2f022896a5c434367c798a36062bd3a884959585e2
SSDEEP
3072:z7UFhRaSAyDllabM6mj9fA43DtXOkE2ahZ440vspPh1d5y36hQkR6OH5l6vL6/D8:PUFOFXM6mj9o48HhZX7H5y3O/HaK3s
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadResource
FindResourceA
LoadLibraryExA
IsDBCSLeadByte
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
CompareStringW
CompareStringA
SetEndOfFile
GetOEMCP
GetACP
SetFilePointer
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
SizeofResource
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
HeapCreate
HeapSize
TerminateProcess
LCMapStringW
LCMapStringA
ExitProcess
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetVersion
GetCommandLineA
HeapReAlloc
HeapAlloc
GetLocalTime
GetSystemTime
GetTimeZoneInformation
RtlUnwind
InterlockedExchange
Sleep
HeapDestroy
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
Process32First
Process32Next
DisableThreadLibraryCalls
GetLastError
CreateFileA
GetFileSize
VirtualAlloc
ReadFile
VirtualFree
GetPrivateProfileIntA
SetFileAttributesA
GetShortPathNameA
FreeLibrary
FindFirstFileW
FindNextFileW
FindClose
ExpandEnvironmentStringsW
LocalFree
VirtualProtect
VirtualProtectEx
CreateThread
WriteProcessMemory
CreateToolhelp32Snapshot
Module32First
Module32Next
lstrcmpiA
CloseHandle
OpenProcess
lstrlenA
lstrcmpA
GetCurrentProcessId
WritePrivateProfileStringA
GetModuleFileNameA
lstrcatA
lstrcpyA
GetPrivateProfileStringA
GetProcessHeap
HeapFree
lstrcpyW
lstrcmpiW
lstrcpynW
lstrcatW
GetSystemDefaultLangID
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
lstrcpynA
GetModuleHandleA
GetVersionExA
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
LoadLibraryA
GetProcAddress
GetEnvironmentStringsW
SetEnvironmentVariableA
SetWindowPos
CharNextA
BringWindowToTop
CallWindowProcW
GetWindowLongW
GetDlgCtrlID
GetWindowThreadProcessId
FillRect
GetFocus
SetWindowTextA
GetCursorPos
SetTimer
UpdateWindow
DefWindowProcA
IsWindow
GetWindowRect
SetWindowsHookExW
GetClassNameA
FindWindowExA
SetWindowLongW
wsprintfW
DrawIconEx
GetWindowDC
FindWindowW
LoadIconW
DestroyIcon
LoadImageW
FindWindowExW
GetSysColor
SendMessageW
PostMessageW
GetParent
SetWindowTextW
GetWindowTextLengthW
SetFocus
SendMessageA
DrawTextW
GetWindowTextW
LoadBitmapA
GetSystemMetrics
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
ReleaseDC
EndPaint
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
ReleaseCapture
SetCapture
PtInRect
GetDC
InflateRect
BeginPaint
SystemParametersInfoA
ShowWindow
PostMessageA
MoveWindow
SetWindowRgn
ScreenToClient
OffsetRect
SetRectEmpty
GetClientRect
DrawFrameControl
GetWindowTextA
DrawTextA
IsRectEmpty
CopyRect
KillTimer
LoadImageA
DeleteDC
GetStockObject
GetObjectA
CreateFontIndirectA
DeleteObject
ExtTextOutA
SetBkColor
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
SetTextColor
SetBkMode
FrameRgn
OffsetRgn
CreateSolidBrush
ExcludeClipRect
SetWindowOrgEx
GetClipBox
BitBlt
EqualRgn
CombineRgn
CreateRectRgn
CreatePolygonRgn
SetViewportOrgEx
GetViewportOrgEx
SetPixel
GetTextExtentPoint32W
GetTextExtentPointW
StretchBlt
SetStretchBltMode
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegQueryValueExW
RegOpenKeyExA
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExW
ShellExecuteA
SHGetSpecialFolderPathW
SHGetMalloc
SHGetDesktopFolder
SHGetSpecialFolderLocation
CoTaskMemAlloc
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
VarUI4FromStr
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
VariantClear
SysFreeString
OleTranslateColor
StrDupA
PathRemoveFileSpecA
PathAppendA
PathIsDirectoryW
PathFileExistsW
StrRStrIW
StrRetToBufW
StrCpyW
PathIsURLW
UrlApplySchemeW
StrDupW
SHGetValueA
StrStrIA
StrCmpNIW
StrStrW
StrCmpW
StrNCatW
StrCmpIW
StrStrIW
InternetCrackUrlW
ImageList_AddMasked
ImageList_Create
ImageList_Draw
ImageList_SetBkColor
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_Remove
ImageList_Destroy
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ