Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
81cc086322ba134b167fcaa3da659e6f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81cc086322ba134b167fcaa3da659e6f_JaffaCakes118.dll
Resource
win10v2004-20240730-en
Target
81cc086322ba134b167fcaa3da659e6f_JaffaCakes118
Size
90KB
MD5
81cc086322ba134b167fcaa3da659e6f
SHA1
bb2ad48e7a8e758aac012c728e07d5ff3323436d
SHA256
2f98b23b943a54840595899c117e164e0388142542d237b448fe1f59f24b422d
SHA512
b5a94cbc30d5f3d8645fcfe411beea2fec38c449fb214d864d08ab8f382115a0e7934788eca52ea0f25625eeebd000f36b135c493eac44bb66cf70b8d1c2b3a7
SSDEEP
1536:7ONx3L4A01nkldK+gXavCg57z1pG+bRoC905:7OX4nnAthd56+bRhA
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrlenW
lstrcatA
lstrcmpiW
CompareFileTime
SystemTimeToFileTime
GetLocalTime
CreateThread
DebugBreak
HeapReAlloc
HeapFree
DeleteFileA
CloseHandle
FlushFileBuffers
WriteFile
CreateFileA
SetLastError
InterlockedDecrement
EnterCriticalSection
LocalFree
SetThreadPriority
InterlockedIncrement
DisableThreadLibraryCalls
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
GetVersionExA
GetSystemInfo
HeapAlloc
lstrcpyA
ResumeThread
ResetEvent
UnmapViewOfFile
CreateMutexA
CreateFileMappingA
ReleaseMutex
SetEvent
GetCommandLineA
GetFileSize
ReadFile
GetDriveTypeA
GetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetSystemDirectoryA
WaitForMultipleObjects
WaitForSingleObject
GetCurrentProcessId
lstrcmpA
VirtualProtect
VirtualQuery
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetTickCount
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
CreateEventA
WritePrivateProfileSectionA
CreateDirectoryA
MapViewOfFile
CharNextA
SetTimer
DestroyWindow
EnumWindows
GetClassNameA
GetWindowThreadProcessId
PostMessageA
IsWindow
PeekMessageA
DefWindowProcW
SetWindowLongA
CallWindowProcW
CallWindowProcA
CreateWindowExA
DefWindowProcA
SetWindowLongW
GetWindowLongA
GetWindowLongW
RegisterClassExA
wsprintfA
LoadCursorA
GetClassInfoExA
GetKeyboardType
UnregisterClassA
KillTimer
RegCreateKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegFlushKey
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
VariantChangeTypeEx
SysStringByteLen
VariantInit
VariantClear
SysAllocStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ