Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
8a101e031c8abfa4f21b19af3c72072f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a101e031c8abfa4f21b19af3c72072f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8a101e031c8abfa4f21b19af3c72072f_JaffaCakes118
Size
56KB
MD5
8a101e031c8abfa4f21b19af3c72072f
SHA1
35e34e84e54fac7e91bf6cc0bc4ce75f3011c3f7
SHA256
c05655418124d4072a86607d2319920ddce89cb74d0e6ef3023956831df314a0
SHA512
20deb646b237a178972d4272db41c9d69d1f53d72027ef170c6665ca3d77588ad5485770401da9dbf7b4d5ccd0d4cb7357772cf6f88e9db6eb250b1ba23c4fda
SSDEEP
768:zFGCoof+hykTiuGgKhAe/lIWpJApsDSssO+wcSDPnGMEaR2:c9TTiumVIWcIQGDvlEG
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
InterlockedCompareExchange
lstrcpyA
lstrlenA
GetWindowsDirectoryA
GetProcAddress
CreateFileA
VirtualAlloc
AllocConsole
AssignProcessToJobObject
BeginUpdateResourceW
BuildCommDCBAndTimeoutsA
BuildCommDCBAndTimeoutsW
CancelTimerQueueTimer
CloseHandle
ConnectNamedPipe
CopyFileW
CreateHardLinkA
CreateIoCompletionPort
CreateJobObjectA
CreateMutexW
CreateNamedPipeA
CreateRemoteThread
DebugActiveProcess
DeleteTimerQueueTimer
ExitThread
FatalAppExitA
FileTimeToDosDateTime
FindAtomA
FindFirstChangeNotificationW
FindFirstFileExA
FindVolumeClose
FormatMessageA
FormatMessageW
FreeEnvironmentStringsW
GetCPInfo
GetCommProperties
GetCompressedFileSizeA
GetConsoleTitleA
GetConsoleWindow
GetCurrentConsoleFont
GetCurrentThread
GetDiskFreeSpaceExA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetFileSize
GetFileType
GetLongPathNameA
GetLongPathNameW
GetModuleFileNameA
GetModuleFileNameW
GetPrivateProfileSectionNamesW
GetPrivateProfileStringW
GetPrivateProfileStructA
GetProcessShutdownParameters
GetProfileSectionA
GetStdHandle
GetSystemWindowsDirectoryW
GetTapePosition
GetThreadSelectorEntry
GlobalFindAtomW
GlobalGetAtomNameW
GlobalMemoryStatusEx
GlobalReAlloc
GlobalUnWire
Heap32ListFirst
InterlockedDecrement
IsBadStringPtrA
IsDebuggerPresent
LocalFileTimeToFileTime
LocalHandle
LocalUnlock
MapUserPhysicalPages
Module32NextW
MultiByteToWideChar
OpenFileMappingW
OpenWaitableTimerW
PeekConsoleInputA
PeekNamedPipe
PostQueuedCompletionStatus
Process32Next
ProcessIdToSessionId
PurgeComm
ReadProcessMemory
ReplaceFile
RequestDeviceWakeup
ResetWriteWatch
SetCommBreak
SetComputerNameExW
SetDefaultCommConfigW
SetEnvironmentVariableA
SetFileTime
SetTimerQueueTimer
SetVolumeLabelW
SetupComm
TerminateProcess
Thread32First
UpdateResourceA
WriteConsoleOutputA
_hread
_lclose
_lwrite
lstrcat
lstrcpyn
RemoveMenu
ScreenToClient
SendNotifyMessageW
SetActiveWindow
SetCapture
SetClipboardViewer
SetDlgItemInt
SetKeyboardState
SetMenu
SetPropA
SetRectEmpty
SetShellWindow
SetThreadDesktop
SetWinEventHook
SetWindowRgn
SetWindowsHookExA
ShowOwnedPopups
SubtractRect
SystemParametersInfoW
TrackMouseEvent
TranslateAcceleratorW
TranslateMDISysAccel
UnregisterDeviceNotification
WINNLSGetEnableStatus
mouse_event
ReleaseDC
ReleaseCapture
RegisterClassExA
PaintDesktop
MessageBoxIndirectW
MapDialogRect
LoadKeyboardLayoutA
LoadIconW
LoadCursorA
LoadAcceleratorsW
IsCharLowerW
IsCharLowerA
HiliteMenuItem
HideCaret
GrayStringW
GetScrollBarInfo
GetQueueStatus
GetPropW
GetMonitorInfoA
GetMenuStringW
GetMenuContextHelpId
GetLastInputInfo
GetLastActivePopup
GetKeyboardLayoutNameW
GetFocus
GetDlgCtrlID
GetDesktopWindow
GetComboBoxInfo
GetClipboardData
GetClassWord
GetClassNameA
GetClassInfoExA
GetAsyncKeyState
GetAncestor
GetAltTabInfoW
GetAltTabInfoA
EnumThreadWindows
EnumDisplaySettingsW
EnumChildWindows
EnableMenuItem
DrawTextExW
DrawIconEx
DlgDirListComboBoxW
DispatchMessageW
DestroyWindow
DestroyCaret
DeregisterShellHookWindow
DefWindowProcW
DefWindowProcA
DefFrameProcA
DdeQueryNextServer
DdeGetLastError
DdeCreateDataHandle
DdeConnectList
DdeAddData
CreateIconIndirect
CreateDialogParamW
CopyImage
CloseClipboard
CheckMenuRadioItem
ChangeDisplaySettingsExW
ChangeClipboardChain
CascadeWindows
ArrangeIconicWindows
EndMenu
SHEmptyRecycleBinW
Shell_NotifyIcon
ShellHookProc
ShellExecuteExW
ShellExecuteA
ShellAboutW
ShellAboutA
SHQueryRecycleBinW
SHQueryRecycleBinA
SHPathPrepareForWriteA
SHLoadInProc
CommandLineToArgvW
DoEnvironmentSubstW
DragAcceptFiles
DragFinish
DragQueryFileW
DragQueryPoint
ExtractAssociatedIconA
ExtractAssociatedIconExW
ExtractIconEx
ExtractIconExA
ExtractIconExW
ExtractIconW
FindExecutableW
SHIsFileAvailableOffline
SHBindToParent
SHBrowseForFolder
SHBrowseForFolderA
SHBrowseForFolderW
SHCreateDirectoryExW
SHEmptyRecycleBinA
Shell_NotifyIconA
SHFileOperationW
SHFormatDrive
SHFreeNameMappings
SHGetDataFromIDListW
SHGetDesktopFolder
SHGetDiskFreeSpaceA
SHGetDiskFreeSpaceExA
SHGetDiskFreeSpaceExW
SHGetFileInfoA
SHGetFileInfoW
SHGetFolderPathA
SHGetFolderPathW
SHGetIconOverlayIndexA
SHGetIconOverlayIndexW
SHGetMalloc
SHGetPathFromIDListW
SHGetSettings
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
SHInvokePrinterCommandW
StrChrIA
StrChrIW
StrChrW
StrCmpNA
StrCmpNIA
StrCmpNW
StrRChrA
StrRChrIW
StrRStrIA
StrStrIA
StrStrIW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ