Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a154b38078d0eaa00d3a00f6cbc076af_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a154b38078d0eaa00d3a00f6cbc076af_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a154b38078d0eaa00d3a00f6cbc076af_JaffaCakes118
Size
135KB
MD5
a154b38078d0eaa00d3a00f6cbc076af
SHA1
0889000a7cca23c2fd09df995f6d728d8278a1db
SHA256
64f0daed0704dad9bafd32b98d1a04166d1fff8e07374a873ff69ea8fbc3afa1
SHA512
2454374a6b3870f0239faa7e9766ccd68ca67a7bf078ae826a24a384c150e361c08d2a12970fe1c8b6e93ca919c54be799a61071dac35fc23a87eb8b278562c0
SSDEEP
3072:G8tpjIC2fxUYA1jvJCaD/fjo6D25MsRGJk9Rg+2/ASqa69OzXWx:Htpjx2fxkjow2DRCk7n1a6YKx
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
GetModuleHandleA
GetProcAddress
VirtualProtect
GetKeyboardType
RegQueryValueExA
SysFreeString
SetPixel
WSACleanup
InternetReadFile
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ