Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a22d373b96b3e9ae466b264990a06236_JaffaCakes118.dll
Resource
win7-20240729-en
Target
a22d373b96b3e9ae466b264990a06236_JaffaCakes118
Size
497KB
MD5
a22d373b96b3e9ae466b264990a06236
SHA1
9b7d606c772b9d9527b3e97715d8f4776676174b
SHA256
ffa860533eb8cca7aa6efc96d6634123553adf78e2249ea6f0f48fe3ffdc5781
SHA512
b93d543f3e511a8ecb939d61903a54bfe5a21d1bb8aaaeab60ab605ecaa6b48904eae71d47abce61422556ff31d26d302282a2ec1c169df6d525719fbbcada0a
SSDEEP
12288:D1ujbmG9tCfxzK8D90scj22Blpd73WWTUl4x:D1unmG9tCfxeqcrdyWTUux
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PlaySoundA
PathFileExistsA
InternetOpenA
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
DeleteUrlCacheEntry
FindCloseUrlCache
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
SetupIterateCabinetA
RemoveDirectoryA
DeleteFileA
InterlockedIncrement
WideCharToMultiByte
CloseHandle
WriteFile
CreateFileA
GetTempPathA
MoveFileExA
lstrlenW
Sleep
GetModuleFileNameA
WritePrivateProfileStringA
GetWindowsDirectoryA
GetCurrentProcessId
SetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetFileAttributesW
GetVersion
OutputDebugStringA
LoadLibraryW
GetModuleFileNameW
LoadLibraryA
GlobalUnlock
GlobalLock
LeaveCriticalSection
EnterCriticalSection
GlobalAlloc
TerminateThread
FreeLibrary
lstrcpyA
lstrcatA
GetCurrentThreadId
DebugBreak
FindFirstFileA
FindNextFileA
FindClose
GetTempFileNameA
FlushInstructionCache
GetCurrentProcess
lstrcmpA
GetCurrentThread
HeapFree
lstrlenA
GetProcessHeap
DisableThreadLibraryCalls
GetShortPathNameA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
SetUnhandledExceptionFilter
HeapSize
TerminateProcess
ExitProcess
TlsGetValue
TlsFree
TlsAlloc
GetCommandLineA
HeapReAlloc
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
CreateDirectoryA
GetFullPathNameA
GetLocalTime
GetSystemTime
GetTimeZoneInformation
ExitThread
TlsSetValue
CreateThread
ResumeThread
RtlUnwind
RaiseException
LocalAlloc
InterlockedExchange
LocalFree
GetVersionExA
InterlockedDecrement
MultiByteToWideChar
GetLastError
ReadFile
GetDriveTypeA
SetEndOfFile
CompareStringA
CompareStringW
LCMapStringA
LCMapStringW
HeapAlloc
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetStdHandle
GetFileType
GetStartupInfoA
GetCPInfo
SetFilePointer
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetHandleCount
CheckMenuItem
CreatePopupMenu
AppendMenuA
EmptyClipboard
LoadCursorFromFileA
CreateWindowExA
GetDlgItem
InvalidateRgn
GetWindowRect
MoveWindow
SetActiveWindow
DispatchMessageA
SetCapture
ReleaseCapture
DestroyAcceleratorTable
CreateAcceleratorTableA
GetDesktopWindow
RedrawWindow
SetWindowPos
BeginPaint
GetClientRect
EndPaint
IsChild
UpdateWindow
CallWindowProcA
SystemParametersInfoA
GetWindowDC
SetRectEmpty
GetDC
ReleaseDC
FillRect
DrawEdge
OffsetRect
GetMenuItemInfoA
CopyRect
DestroyWindow
SetFocus
ShowWindow
LoadImageA
LoadMenuA
TranslateMessage
InsertMenuA
TrackPopupMenu
DestroyMenu
LoadStringA
wvsprintfA
MapWindowPoints
GetMessagePos
GetCursorPos
GetFocus
SetWindowsHookExA
WindowFromPoint
SetTimer
UnregisterClassA
PostMessageA
SetCursor
ScreenToClient
PtInRect
GetKeyState
GetClassNameA
CallNextHookEx
InvalidateRect
CharNextA
MessageBoxA
KillTimer
UnhookWindowsHookEx
GetWindowLongA
GetWindowTextLengthA
GetWindowTextA
SetWindowLongA
GetWindow
GetClassInfoExA
RegisterClassExA
RegisterWindowMessageA
LoadCursorA
GetSystemMetrics
SetWindowTextA
GetSysColor
OpenClipboard
GetClipboardData
CloseClipboard
IsWindowVisible
DefWindowProcA
SendMessageA
CharLowerA
wsprintfA
IsWindow
GetParent
EnableMenuItem
DestroyCursor
GetSubMenu
DrawTextA
DeleteObject
CreateFontA
GetTextExtentPointA
GetStockObject
GetObjectA
GetDeviceCaps
CreateSolidBrush
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
DeleteDC
CreateFontIndirectA
CreateBrushIndirect
SelectObject
SetBkMode
SetBkColor
SetTextColor
GetTextMetricsA
GetTextExtentPoint32A
ExtTextOutA
ShellExecuteA
SHAddToRecentDocs
DragQueryFileA
OleUninitialize
OleInitialize
ReleaseStgMedium
CoInitialize
CoCreateInstance
CoCreateGuid
CoUninitialize
RegisterDragDrop
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
StringFromCLSID
CoTaskMemAlloc
OleLockRunning
CoTaskMemRealloc
OleRun
CreateStreamOnHGlobal
SysFreeString
SysAllocStringLen
SysAllocStringByteLen
SysStringLen
SysAllocString
VariantClear
VariantInit
SysStringByteLen
VariantChangeType
LoadTypeLi
VariantCopy
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
SafeArrayPutElement
SafeArrayCreate
LoadRegTypeLi
DispCallFunc
OleCreateFontIndirect
VarUI4FromStr
RegisterTypeLi
GetErrorInfo
UuidFromStringA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
TBStudioReg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ