Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
70a4344cc2d42818dde4462b96650870_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
70a4344cc2d42818dde4462b96650870_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
70a4344cc2d42818dde4462b96650870_JaffaCakes118
Size
54KB
MD5
70a4344cc2d42818dde4462b96650870
SHA1
30f4498cf942606f1d4225c27ee299b777b872d1
SHA256
8a31705bced87872364b8952a2d9aa80f8718a19046bfc14f84d1997d5cc47da
SHA512
d71bce4427c0e3c5ce889378f26da644be4e6610be3eba04fb8f3b1b642c5142d10d770bacb0c0c322905405e1756cbdbe44ed339cc72c564db45d2a2d5df171
SSDEEP
1536:6Vdq/q9epjm6Aln0SBsv5xAQYMG6zxgtWO6yNc:wdAWoSv4YMGk1ORG
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAlloc
CreateFileA
lstrcatA
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
LoadLibraryW
GetSystemInfo
Beep
BindIoCompletionCallback
ClearCommBreak
CreateEventA
CreateJobObjectA
DefineDosDeviceW
DeleteTimerQueueEx
DeleteTimerQueueTimer
DeleteVolumeMountPointW
DnsHostnameToComputerNameW
EndUpdateResourceW
EnumResourceTypesW
EnumSystemCodePagesW
EnumSystemLocalesW
FindFirstChangeNotificationA
FindFirstChangeNotificationW
FindFirstVolumeMountPointW
FindNextFileA
FindNextVolumeMountPointA
FindVolumeMountPointClose
GetAtomNameA
GetCPInfo
GetCPInfoExA
GetCommandLineW
GetConsoleAliasA
GetCurrentProcess
GetCurrentThread
GetDiskFreeSpaceA
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileAttributesW
GetModuleHandleW
GetProcessShutdownParameters
GetShortPathNameW
GetStringTypeW
GetSystemDefaultLCID
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetThreadLocale
GetUserDefaultLangID
GetVolumeInformationA
GlobalDeleteAtom
GlobalFix
GlobalGetAtomNameW
GlobalMemoryStatus
GlobalSize
GlobalUnWire
HeapCreate
HeapLock
HeapReAlloc
HeapWalk
InitAtomTable
IsBadHugeReadPtr
LocalFileTimeToFileTime
LocalReAlloc
Module32First
Module32NextW
MoveFileExW
OpenJobObjectA
OpenJobObjectW
OutputDebugStringW
PeekConsoleInputA
Process32Next
ReadConsoleInputA
ReadConsoleOutputA
ReadFileScatter
RemoveDirectoryW
ReplaceFileW
SetComputerNameExW
SetConsoleScreenBufferSize
SetCurrentDirectoryW
SetFilePointerEx
SetHandleCount
SetLastError
SetLocaleInfoA
SetTapeParameters
SetThreadAffinityMask
SetVolumeMountPointW
TlsGetValue
UnlockFileEx
VirtualUnlock
WaitForMultipleObjects
WaitForSingleObject
WaitNamedPipeW
WriteConsoleW
WriteFileEx
_lwrite
lstrcpyn
lstrcpynA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
IsDebuggerPresent
CloseWindow
CopyAcceleratorTableW
CreateCursor
CreateDesktopA
DdeClientTransaction
DdeEnableCallback
DdeGetData
DdeUninitialize
DestroyMenu
DialogBoxIndirectParamA
DialogBoxIndirectParamW
DialogBoxParamW
DlgDirSelectExW
EnumClipboardFormats
EnumDisplayDevicesA
EnumDisplaySettingsW
EnumPropsA
EnumPropsExA
GetActiveWindow
GetClipboardFormatNameA
GetClipboardFormatNameW
GetClipboardViewer
GetDlgItemInt
GetDlgItemTextA
GetGuiResources
GetKeyNameTextW
GetMessageA
GetNextDlgTabItem
GetParent
GetWindowContextHelpId
GetWindowModuleFileNameA
GetWindowTextA
GetWindowThreadProcessId
IMPGetIMEW
IMPSetIMEA
InvertRect
IsClipboardFormatAvailable
IsDlgButtonChecked
CheckDlgButton
IsRectEmpty
IsWindow
IsZoomed
LoadMenuIndirectW
LoadMenuW
LockSetForegroundWindow
LookupIconIdFromDirectory
MapVirtualKeyExA
MessageBeep
ModifyMenuW
MonitorFromPoint
NotifyWinEvent
PtInRect
RealGetWindowClassW
RedrawWindow
RegisterClassExW
RegisterClipboardFormatA
RegisterClipboardFormatW
ReleaseDC
SendIMEMessageExA
SetClassLongW
SetClipboardData
SetClipboardViewer
SetMenuItemBitmaps
SetMenuItemInfoA
SetMenuItemInfoW
SetPropA
SetRectEmpty
SetSysColors
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
SetWindowsHookExA
SetWindowsHookExW
SystemParametersInfoW
TileChildWindows
ToAscii
TrackPopupMenu
UnhookWindowsHook
UnionRect
UpdateLayeredWindow
VkKeyScanExA
VkKeyScanW
WaitForInputIdle
WinHelpA
AllowSetForegroundWindow
AppendMenuW
BeginDeferWindowPos
CharUpperBuffA
IsIconic
CoBuildVersion
CoCreateGuid
CoCreateInstanceEx
CoDisconnectObject
CoGetApartmentID
CoGetCallContext
CoGetCancelObject
CoGetInstanceFromFile
CoGetInstanceFromIStorage
CoGetMarshalSizeMax
CoGetTreatAsClass
CoImpersonateClient
CoInitializeSecurity
CoInitializeWOW
CoLockObjectExternal
CoQueryAuthenticationServices
CoQueryClientBlanket
CoQueryReleaseObject
CoRegisterMessageFilter
CoRegisterSurrogateEx
CoReleaseServerProcess
CoResumeClassObjects
CoTaskMemFree
CreateFileMoniker
CreateGenericComposite
CreateObjrefMoniker
DcomChannelSetHResult
FmtIdToPropStgName
GetDocumentBitStg
GetHGlobalFromStream
HACCEL_UserMarshal
HACCEL_UserUnmarshal
HBITMAP_UserFree
HBITMAP_UserSize
HBRUSH_UserMarshal
HBRUSH_UserUnmarshal
HDC_UserSize
HENHMETAFILE_UserFree
HENHMETAFILE_UserUnmarshal
HMENU_UserFree
HMENU_UserUnmarshal
HMETAFILEPICT_UserMarshal
HMETAFILEPICT_UserUnmarshal
HMETAFILE_UserUnmarshal
HkOleRegisterObject
MonikerCommonPrefixWith
MonikerRelativePathTo
OleConvertOLESTREAMToIStorage
OleCreate
OleCreateEmbeddingHelper
OleCreateFromData
OleCreateFromDataEx
OleCreateFromFileEx
OleCreateLinkEx
OleCreateLinkToFileEx
OleGetAutoConvert
OleInitializeWOW
OleLockRunning
OleMetafilePictFromIconAndLabel
OleQueryCreateFromData
OleRegEnumVerbs
OleRegGetMiscStatus
OleRegGetUserType
OleSetContainedObject
OleSetMenuDescriptor
PropStgNameToFmtId
ReadClassStg
ReadClassStm
STGMEDIUM_UserFree
STGMEDIUM_UserMarshal
StgConvertPropertyToVariant
StgCreatePropSetStg
StgCreatePropStg
StgGetIFillLockBytesOnILockBytes
StgIsStorageILockBytes
StgOpenAsyncDocfileOnIFillLockBytes
StgOpenPropStg
StgOpenStorageEx
UpdateDCOMSettings
UtConvertDvtd32toDvtd16
WdtpInterfacePointer_UserSize
WdtpInterfacePointer_UserUnmarshal
WriteFmtUserTypeStg
WriteOleStg
WriteStringStream
CoAllowSetForegroundWindow
CoAddRefServerProcess
CLSIDFromProgIDEx
CLSIDFromProgID
CoCopyProxy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ