Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
6aee58b63843a0d73a98a2922092de8a_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6aee58b63843a0d73a98a2922092de8a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6aee58b63843a0d73a98a2922092de8a_JaffaCakes118
Size
839KB
MD5
6aee58b63843a0d73a98a2922092de8a
SHA1
abc6ac9a98360aa065f32e15d0a9293f8aa26e32
SHA256
fff929c4f44411e0f8da272f8d1db4593b23acd3c52cf8958792aef9548b4623
SHA512
ab93f97b94953edc7d051ffa48cf444d4f09af479746ad88b86907e50d8984919fa1fdef473b2cb73adcb23378c03a81a06eece1cf7b1d12a469c0eec943d20c
SSDEEP
6144:XkX7Ahus9knpaHe51x/ZD6KJ02lclcB6BQVnhLbm6BN6BILsWwrdsWhc:0Ehus+5rZDjJ025oQVhX3UjdrdsWy
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalFree
LocalAlloc
GetLastError
GetCurrentProcess
GetModuleFileNameA
lstrlenA
GetSystemDirectoryA
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
SetFileAttributesA
lstrcmpA
FindFirstFileA
lstrcatA
lstrcpyA
_lclose
_llseek
_lopen
WritePrivateProfileStringA
GetWindowsDirectoryA
CreateDirectoryA
GetFileAttributesA
ExpandEnvironmentStringsA
IsDBCSLeadByte
GetShortPathNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcmpiA
GetProcAddress
GlobalUnlock
GlobalLock
GlobalAlloc
FreeResource
CloseHandle
LoadResource
SizeofResource
FindResourceA
ReadFile
WriteFile
SetFilePointer
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetCurrentDirectoryA
GetTempFileNameA
ExitProcess
CreateFileA
LoadLibraryExA
lstrcpynA
GetVolumeInformationA
FormatMessageA
GetCurrentDirectoryA
GetVersionExA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetTempPathA
GetSystemInfo
CreateMutexA
SetEvent
CreateEventA
CreateThread
ResetEvent
TerminateThread
GetDriveTypeA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
LockResource
LoadLibraryA
GetDiskFreeSpaceA
MulDiv
EnumResourceLanguagesA
FreeLibrary
GlobalFree
TlsSetValue
TlsGetValue
GetModuleHandleW
lstrlenW
WriteProcessMemory
WideCharToMultiByte
WaitForMultipleObjectsEx
VirtualQueryEx
VirtualQuery
VirtualProtectEx
VirtualProtect
VirtualFree
VirtualAlloc
UnmapViewOfFile
TerminateProcess
SystemTimeToFileTime
SuspendThread
Sleep
SetThreadPriority
SetThreadContext
SetThreadAffinityMask
SetPriorityClass
SetLastError
SetErrorMode
SetEndOfFile
ResumeThread
ReleaseSemaphore
ReleaseMutex
ReadProcessMemory
QueryPerformanceFrequency
QueryPerformanceCounter
QueryDosDeviceW
PulseEvent
OutputDebugStringW
OpenProcess
OpenMutexW
OpenFileMappingA
OpenEventA
MultiByteToWideChar
MoveFileW
MapViewOfFile
LoadLibraryExW
LoadLibraryW
LeaveCriticalSection
InitializeCriticalSection
GlobalSize
GlobalReAlloc
GlobalHandle
GlobalFindAtomW
GlobalDeleteAtom
GlobalAddAtomW
GetWindowsDirectoryW
GetVersionExW
GetVersion
GetTickCount
GetThreadPriority
GetThreadLocale
GetThreadContext
GetTempPathW
GetSystemTime
GetSystemDirectoryW
GetStartupInfoW
GetProcessVersion
GetProcessHeap
GetProcessAffinityMask
GetPriorityClass
GetModuleFileNameW
GetLogicalDrives
GetLogicalDriveStringsW
GetLocaleInfoW
GetFileSize
GetFileAttributesW
GetExitCodeThread
GetDriveTypeW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetACP
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
FormatMessageW
FlushViewOfFile
FlushFileBuffers
FindResourceW
FindNextFileW
FindFirstFileW
FileTimeToDosDateTime
ExpandEnvironmentStringsW
EnumResourceTypesW
EnumResourceNamesW
EnterCriticalSection
DuplicateHandle
DisconnectNamedPipe
DeleteFileW
DeleteCriticalSection
CreateSemaphoreW
CreateNamedPipeW
CreateMutexW
CreateFileMappingA
CreateFileMappingW
CreateFileW
CreateEventW
CopyFileW
ConnectNamedPipe
CompareStringW
CancelIo
LoadIconA
GetActiveWindow
GetOpenClipboardWindow
GetLastActivePopup
LoadCursorFromFileA
PathToRegion
RegQueryValueExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ