Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
a84a9bd4c0a152e80d4f2d0a91a7bcab_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a84a9bd4c0a152e80d4f2d0a91a7bcab_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a84a9bd4c0a152e80d4f2d0a91a7bcab_JaffaCakes118
Size
180KB
MD5
a84a9bd4c0a152e80d4f2d0a91a7bcab
SHA1
ad3bdad2dcc095604004b4d12772e60844317ff2
SHA256
2528d272785d2bf3b06ac65e79cc887ae8b763b35c47a37a3c1d66b99921b946
SHA512
e526e8e3be4200ea9b855634ea7ae6a671ec4a9c7ad7450d502eb49ec23e236a8ca8a17230ba1e74484e9035253c5acff5bf8a5200c3a7ddeaa5e763d4e1bab0
SSDEEP
3072:dL5xdoLT7jcBwcvDjPyrlfAS+3Js6zT5IXR3fB:dXdkczSfn+3Tz+pB
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
FreeLibrary
lstrlenA
lstrcmpiA
MultiByteToWideChar
IsDBCSLeadByte
lstrlenW
GetLastError
LoadLibraryExA
CloseHandle
LoadLibraryA
GetProcAddress
CreateThread
CreateDirectoryA
ExpandEnvironmentStringsA
GetFileAttributesA
CreateFileA
SetFilePointer
GetSystemTime
GetTimeFormatA
WriteFile
GetVersionExA
GetModuleFileNameA
RaiseException
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleHandleA
WideCharToMultiByte
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
LCMapStringA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetSystemInfo
VirtualQuery
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
Sleep
ExitProcess
VirtualFree
HeapCreate
GetStdHandle
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
CharNextA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
CoTaskMemAlloc
CoCreateInstance
CoGetClassObject
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
SafeArrayUnlock
SafeArrayDestroy
DispCallFunc
VariantInit
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetVartype
LoadTypeLi
LoadRegTypeLi
SysFreeString
SysStringLen
VariantClear
VariantCopy
VarUI4FromStr
SafeArrayLock
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ