Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
5c4359dd0768c331a0c8c2ec31908ab5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5c4359dd0768c331a0c8c2ec31908ab5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5c4359dd0768c331a0c8c2ec31908ab5_JaffaCakes118
Size
104KB
MD5
5c4359dd0768c331a0c8c2ec31908ab5
SHA1
8810150153167cb7e1e086825113917abdd9e0b0
SHA256
ad633018b5db542f3bac65bf5995511a81b3132a16684dedabb266cb431b3a7e
SHA512
b405c6796b5b8cc955c211849a07cacd98d3376aea1fce8fc957ef0e0d93cd3bb89b78f1a4f53daa3a38fe828a47ae7965855c2cd132d2ca5a0ec47654d02390
SSDEEP
1536:4MTuaICESzERMEkVgcyQXUvmti7ylYlFzMJH2Qdj1SeyLC90:4MS2EZD0gcyQX2z7ylYlRMJH2bHi
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindResourceA
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
LoadResource
GetProcAddress
LoadLibraryA
lstrcpyA
SizeofResource
FreeLibrary
WideCharToMultiByte
InitializeCriticalSection
GetModuleHandleA
GetShortPathNameA
HeapCreate
GetSystemInfo
DisableThreadLibraryCalls
HeapFree
HeapReAlloc
HeapAlloc
DebugBreak
GetLastError
VirtualQuery
VirtualProtect
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
lstrcmpA
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameA
lstrcmpiA
lstrlenW
GetVersionExA
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
lstrcatA
DeleteCriticalSection
HeapDestroy
InvalidateRgn
GetDlgItem
GetClassNameA
CreateWindowExA
CallWindowProcW
SetWindowLongW
GetWindowLongW
CreateIconIndirect
UnregisterClassA
GetKeyState
PtInRect
UnionRect
CharNextA
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetDesktopWindow
IsWindow
BeginPaint
EndPaint
CallWindowProcA
GetParent
GetFocus
IsChild
SetFocus
DefWindowProcW
wsprintfA
IsRectEmpty
DrawTextA
CopyRect
SendMessageA
SetCursor
GetSysColor
SetWindowPos
MoveWindow
InvalidateRect
ShowWindow
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetWindow
DefWindowProcA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
GetWindowLongA
SetWindowLongA
GetWindowRect
MapWindowPoints
GetWindowRgn
RedrawWindow
SetWindowRgn
GetClientRect
OffsetRect
SetRect
IntersectRect
UpdateWindow
GetDC
ReleaseDC
FillRect
SetRectEmpty
DestroyWindow
LoadImageA
LoadStringA
ExtCreateRegion
GetDIBits
SetBitmapBits
GetPixel
CreateBitmap
GetObjectA
GetDeviceCaps
CreateSolidBrush
CreateCompatibleBitmap
CreateCompatibleDC
GetBitmapBits
DeleteObject
DeleteDC
SelectObject
SetBkMode
ExtTextOutA
CreateRectRgnIndirect
SetRectRgn
CreateRoundRectRgn
SetBkColor
SetTextColor
GetStockObject
OffsetRgn
CreateRectRgn
CombineRgn
BitBlt
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegEnumValueA
OleLoadFromStream
CoTaskMemRealloc
OleRegGetMiscStatus
OleRegGetUserType
OleRegEnumVerbs
OleLockRunning
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CreateOleAdviseHolder
OleSaveToStream
StringFromCLSID
WriteClassStm
VariantClear
SysStringByteLen
SysAllocStringByteLen
VariantChangeType
RegisterTypeLi
LoadTypeLi
VariantChangeTypeEx
LoadRegTypeLi
OleCreateFontIndirect
SysAllocStringLen
SysAllocString
SysFreeString
VariantInit
SysStringLen
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ