Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
77ec983e5eaef8e0187eff7da2bc9ccf_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
77ec983e5eaef8e0187eff7da2bc9ccf_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
77ec983e5eaef8e0187eff7da2bc9ccf_JaffaCakes118
Size
90KB
MD5
77ec983e5eaef8e0187eff7da2bc9ccf
SHA1
1fb14f1e20df1da328cd89e97b4d82b14c499a8d
SHA256
57b6d4021867e2ec5a6cc52562e201cb916ef9d2436a97ace3c4411865ff8370
SHA512
bc48a1ad37f342116710ebf5cb4ee140e2099534ca9c6f1b24b13f71cebd743503fd86effff1e5e950684272610758dcd9400a02b6373130f6da27bd9da62046
SSDEEP
1536:OYWG58WVMvbGwWB/K3EZtA0rGo++nPGVem7zCV4iSC900x:BWGBVMvbqZNneVem7+4QB
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
GetProcAddress
LoadLibraryA
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
CreateFileA
ReadFile
WriteFile
SetFilePointer
GetFileTime
SetFileTime
GetFileAttributesA
MoveFileA
DeleteFileA
SetFileAttributesA
GetFileSize
CreateDirectoryA
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
HeapCreate
GetWindowsDirectoryA
SearchPathA
GetCurrentProcessId
VirtualProtect
VirtualQuery
LocalFree
SetLastError
GetSystemDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetDriveTypeA
GetCommandLineA
CreateFileMappingA
DuplicateHandle
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
DebugBreak
HeapReAlloc
HeapFree
LockResource
FormatMessageA
CreateProcessA
GetVersionExA
GetSystemInfo
HeapAlloc
DisableThreadLibraryCalls
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FindResourceA
LoadResource
CreateMutexA
SizeofResource
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
InterlockedIncrement
lstrcmpA
GetTickCount
lstrcatA
GetLastError
lstrcmpiA
MultiByteToWideChar
lstrcpyA
lstrlenA
lstrlenW
WideCharToMultiByte
WaitForSingleObject
ReleaseMutex
CloseHandle
CompareStringA
GetDC
ReleaseDC
InvalidateRect
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
SetWindowPos
IsWindow
GetParent
SetFocus
GetFocus
EndPaint
LoadCursorA
RegisterClassExA
CreateWindowExA
CallWindowProcA
DefWindowProcW
GetClientRect
BeginPaint
EnumWindows
GetClassNameA
wsprintfA
CharNextA
DefWindowProcA
DestroyWindow
ShowWindow
SetWindowLongA
GetWindowLongA
GetWindowThreadProcessId
PostMessageA
PeekMessageA
GetDesktopWindow
GetWindowRect
AdjustWindowRect
LoadStringA
UnregisterClassA
GetKeyboardType
GetWindowLongW
SetWindowLongW
CallWindowProcW
GetClassInfoExA
IsChild
CreateDCA
GetDeviceCaps
LPtoDP
SaveDC
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
RestoreDC
CreateRectRgnIndirect
CryptGetUserKey
CryptEncrypt
CryptImportKey
CryptExportKey
CryptGenKey
CryptDeriveKey
CryptSignHashA
RegCreateKeyA
RegFlushKey
RegQueryValueExA
GetUserNameA
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
CryptDecrypt
SHGetDesktopFolder
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
CreateOleAdviseHolder
CoCreateInstance
OleRegGetMiscStatus
OleRegGetUserType
OleRegEnumVerbs
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringByteLen
SysAllocStringByteLen
VariantClear
VariantInit
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
RegisterTypeLi
OleCreatePropertyFrame
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ