Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
5d18fde3013072baa0ad6d18e42b8bf9_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5d18fde3013072baa0ad6d18e42b8bf9_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5d18fde3013072baa0ad6d18e42b8bf9_JaffaCakes118
Size
201KB
MD5
5d18fde3013072baa0ad6d18e42b8bf9
SHA1
ff42d59e5a3141185fa7889a95fc9bdf62e142fb
SHA256
ce0a329aff53f364cbf4c81c07cd442d1232dfd2b043524344d01fdaa5bf1636
SHA512
c152ed9b6f7566cc279841f0010b05a9aff7ad38bc70fd382d3c84cf697b48661d2a43d2f74bb81dceea3e5dd1e7843295535a07e32485f348b320483fd53743
SSDEEP
6144:4iqAY6dewt+zaYhpzSMofQN64swMv6Y8x1cEJX:4ilttLYhpBhble8fcs
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAllocEx
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
GetCurrentProcess
RtlUnwind
IsDebuggerPresent
LoadIconA
ShowCursor
LoadCursorA
GetStockObject
RegCloseKey
RegOpenKeyExA
CoInitializeEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ