Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
8a73bd9ffba6f2d3b976de37166dae6a_JaffaCakes118.dll
Resource
win7-20240705-en
Target
8a73bd9ffba6f2d3b976de37166dae6a_JaffaCakes118
Size
59KB
MD5
8a73bd9ffba6f2d3b976de37166dae6a
SHA1
92457eadbde3ea8779bb879b5fcfbc6d8c36b258
SHA256
2acfc20d1bc183d085acdc3fe21eb7898ebec38abc56c83455cd900ebf132126
SHA512
0c6ff93db4700ae1c9989c6ada0895034eb368bf03de6ee7941bb7f186a532ef1fd1263c0dd107b186de62e4ad3b3fa6dff8ffa84529d591b558d7fa045d63a8
SSDEEP
768:SMlsVPGMEyrQAhfZyjJLVyE8OnolFOWeZm8ix1JoM6RXvqOauKbC90LZfG:FsVPGMFQQ6xt02Wqt41JFaXvqOOC90t
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegFlushKey
RegQueryValueExA
DeleteCriticalSection
lstrcmpiA
LeaveCriticalSection
EnterCriticalSection
lstrcpyW
WideCharToMultiByte
lstrlenW
GetCurrentProcessId
VirtualProtect
VirtualQuery
FlushInstructionCache
InitializeCriticalSection
lstrlenA
CloseHandle
CreateEventA
DisableThreadLibraryCalls
WaitForSingleObject
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
GetSystemDirectoryA
lstrcmpA
DebugBreak
HeapReAlloc
HeapFree
SetLastError
CreateFileMappingA
LocalFree
CreateMutexA
ReleaseMutex
GetCurrentThreadId
MultiByteToWideChar
MapViewOfFile
UnmapViewOfFile
CLSIDFromString
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoUninitialize
VariantClear
SysAllocString
LoadTypeLi
RegisterTypeLi
VariantInit
VariantChangeTypeEx
SysFreeString
GetWindowThreadProcessId
GetFocus
GetWindowTextW
SendMessageA
SetWindowsHookExA
UnhookWindowsHookEx
EnumWindows
DefWindowProcW
CallWindowProcW
CallWindowProcA
SetWindowLongA
SetWindowLongW
IsWindowUnicode
GetWindowLongA
CallNextHookEx
CharNextA
wsprintfA
RegisterClassExA
DefWindowProcA
CreateWindowExA
PeekMessageA
DestroyWindow
PostMessageA
IsWindow
RegisterWindowMessageA
GetWindow
GetClassNameA
GetParent
GetKeyState
SetWindowTextA
SetFocus
SetWindowTextW
GetPropA
SetPropA
GetWindowLongW
RemovePropA
GetClassInfoExA
MapWindowPoints
FindWindowExA
GetKeyboardType
LoadCursorA
UnregisterClassA
WSACleanup
WSAAsyncGetHostByName
WSACancelAsyncRequest
WSAStartup
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ