Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
977731fd992e5190de741d6d1631f251_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
977731fd992e5190de741d6d1631f251_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
977731fd992e5190de741d6d1631f251_JaffaCakes118
Size
93KB
MD5
977731fd992e5190de741d6d1631f251
SHA1
91434eb0c345139654b34c6d76531fa3b5f0dc00
SHA256
a8b9edb8e090cb28bb4c9578fa1aab53c816b5a9d95853089135f41ff66d7385
SHA512
08d39cb7b6cbd2546c4c95c8df7c402bb9545298c87176da4ef424508ec77ae8be0c17aaedc623c611a4675b3f15613dbb00cbc500d6ccce24302e20addfede2
SSDEEP
1536:/Xe+4OhuPC58iuOWpwDJ53NXXU1b6xzIJrpCrqJVY3/UOaxCO:lEw8iOm53NXXU1uxzIJrkrqJVYPAb
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapFree
DisableThreadLibraryCalls
GetSystemInfo
HeapCreate
HeapReAlloc
FreeLibrary
GetProcAddress
LoadLibraryA
HeapAlloc
DebugBreak
VirtualQuery
VirtualProtect
GetCurrentProcess
lstrlenW
FlushInstructionCache
GetCurrentThreadId
lstrcmpA
InterlockedDecrement
InterlockedIncrement
LockResource
GetVersionExA
GlobalAlloc
GlobalLock
GlobalUnlock
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
lstrcatA
DeleteCriticalSection
InitializeCriticalSection
lstrcpyA
LoadLibraryExA
WideCharToMultiByte
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
FindResourceA
LoadResource
GetLastError
SizeofResource
GetModuleFileNameA
lstrlenA
MultiByteToWideChar
HeapDestroy
GetClassNameA
CreateWindowExA
CallWindowProcW
SetWindowLongW
GetWindowLongW
CreateIconIndirect
UnregisterClassA
GetKeyState
PtInRect
UnionRect
GetDlgItem
InvalidateRgn
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetDesktopWindow
ReleaseDC
IsWindow
BeginPaint
EndPaint
CallWindowProcA
GetParent
GetFocus
IsChild
SetFocus
DefWindowProcW
wsprintfA
IsRectEmpty
LoadStringA
DrawTextA
CopyRect
SendMessageA
SetCursor
GetSysColor
SetWindowPos
MoveWindow
InvalidateRect
ShowWindow
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetWindow
DefWindowProcA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
CharNextA
LoadImageA
DestroyWindow
SetRectEmpty
FillRect
UpdateWindow
IntersectRect
SetRect
OffsetRect
GetClientRect
SetWindowRgn
RedrawWindow
GetWindowRgn
MapWindowPoints
GetWindowRect
SetWindowLongA
GetWindowLongA
RegisterClassExA
GetDC
GetBitmapBits
ExtCreateRegion
GetPixel
CreateBitmap
CreateDIBSection
GetObjectA
DeleteObject
CreateSolidBrush
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
DeleteDC
SelectObject
SetBkMode
ExtTextOutA
CreateRectRgnIndirect
SetRectRgn
CreateRoundRectRgn
SetBkColor
SetTextColor
GetStockObject
OffsetRgn
CreateRectRgn
CombineRgn
GetDeviceCaps
RegCreateKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
OleRegGetMiscStatus
OleRegGetUserType
OleRegEnumVerbs
OleLockRunning
StringFromCLSID
OleLoadFromStream
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoTaskMemRealloc
WriteClassStm
OleSaveToStream
CreateOleAdviseHolder
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
VariantClear
VariantInit
SysFreeString
SysAllocString
SysStringLen
SysAllocStringLen
OleCreateFontIndirect
LoadRegTypeLi
VariantChangeTypeEx
VariantChangeType
SysAllocStringByteLen
SysStringByteLen
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
UuidFromStringW
UuidFromStringA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ