Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
5b76626d5c4ae2a8fecee7b8fc1d5ab7_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b76626d5c4ae2a8fecee7b8fc1d5ab7_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
5b76626d5c4ae2a8fecee7b8fc1d5ab7_JaffaCakes118
Size
90KB
MD5
5b76626d5c4ae2a8fecee7b8fc1d5ab7
SHA1
aab46b81164f7ba5726767aefcb6dac50c0b065a
SHA256
56dff19f4395ffeb717af8c7061a09e0918bc933dae652b439dce6701adfcfaf
SHA512
e259be0c44b2d49e60148bfceafc2e01437c93322f3ecc607dc08339ee45709bc0a05516c876698893a6d85607343326c813343583138cf0bfb97c3902feb4ee
SSDEEP
1536:LONx3L4A01nkldK+gXavCg57BJ1k+nOVC90z:LOX4nnAthd5K+nOw+
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrlenW
lstrcatA
lstrcmpiW
CompareFileTime
SystemTimeToFileTime
GetLocalTime
CreateThread
DebugBreak
HeapReAlloc
HeapFree
DeleteFileA
CloseHandle
FlushFileBuffers
WriteFile
CreateFileA
SetLastError
InterlockedDecrement
EnterCriticalSection
LocalFree
SetThreadPriority
InterlockedIncrement
DisableThreadLibraryCalls
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
GetVersionExA
GetSystemInfo
HeapAlloc
lstrcpyA
ResumeThread
ResetEvent
UnmapViewOfFile
CreateMutexA
CreateFileMappingA
ReleaseMutex
SetEvent
GetCommandLineA
GetFileSize
ReadFile
GetDriveTypeA
GetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetSystemDirectoryA
WaitForMultipleObjects
WaitForSingleObject
GetCurrentProcessId
lstrcmpA
VirtualProtect
VirtualQuery
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetTickCount
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
CreateEventA
WritePrivateProfileSectionA
CreateDirectoryA
MapViewOfFile
CharNextA
SetTimer
DestroyWindow
EnumWindows
GetClassNameA
GetWindowThreadProcessId
PostMessageA
IsWindow
PeekMessageA
DefWindowProcW
SetWindowLongA
CallWindowProcW
CallWindowProcA
CreateWindowExA
DefWindowProcA
SetWindowLongW
GetWindowLongA
GetWindowLongW
RegisterClassExA
wsprintfA
LoadCursorA
GetClassInfoExA
GetKeyboardType
UnregisterClassA
KillTimer
RegCreateKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegFlushKey
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
VariantChangeTypeEx
SysStringByteLen
VariantInit
VariantClear
SysAllocStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ