Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
62acc678c2c7f210f94a953b722c6fec_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
62acc678c2c7f210f94a953b722c6fec_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
62acc678c2c7f210f94a953b722c6fec_JaffaCakes118
Size
1006KB
MD5
62acc678c2c7f210f94a953b722c6fec
SHA1
e4fbe93378200bdef122ee66ac34d491747e833c
SHA256
c0e867d47b0035aca656b5e6de5409fa823eba76fb50c3297b662abaef0645b3
SHA512
a8f5f9aca7c64ee11ad8841c74a513364724aafb41d04af87490944dab46d2c0e0f07ebc958db9a0b8243508661b8854a48445f68ec881ee2494b508b3b0d913
SSDEEP
24576:GLz/hWpOiwRu7O1Nh4c78UYor5m4q3jOdVA0ZEOwk8Ijbw3ft329BEkhsTC8sm4q:GLz0pOiwRu7O1Nh4c7/YoY45NRw3wPEL
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\DistributedAutoLink\Temp\CompileOutputDir\ScanEx.pdb
PathFindFileNameW
PathIsFileSpecW
StrCpyW
PathIsUNCW
PathFindExtensionW
StrCmpW
StrTrimW
StrCmpNW
GetTimeZoneInformation
SetConsoleCtrlHandler
CreateFileA
SetStdHandle
WideCharToMultiByte
GetLongPathNameW
SearchPathW
ExpandEnvironmentStringsW
MultiByteToWideChar
SetEndOfFile
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
GetWindowsDirectoryA
IsValidCodePage
IsValidLocale
GetLocaleInfoW
CompareStringA
CompareStringW
GetSystemDirectoryW
IsBadWritePtr
EnumSystemLocalesA
GetLocaleInfoA
ExitProcess
HeapAlloc
HeapFree
RtlUnwind
RaiseException
GetLastError
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentThreadId
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
FatalAppExitA
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
SetEnvironmentVariableA
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
HeapSize
InterlockedExchange
WriteFile
ReadFile
CloseHandle
FlushFileBuffers
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
LoadLibraryA
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
IsCharAlphaA
RegEnumValueW
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
SHGetFolderPathW
REGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ