Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
a55ac30cf826b9a206f54606d3ac3112_JaffaCakes118.dll
Resource
win7-20240708-en
Target
a55ac30cf826b9a206f54606d3ac3112_JaffaCakes118
Size
162KB
MD5
a55ac30cf826b9a206f54606d3ac3112
SHA1
214cf84d233f3871282bf654137d9fba79640ee3
SHA256
96a29ca7caa43526103772d4fb907f302bbd36fe427b0958588c73bd7d501a8d
SHA512
d2e666048f7b4c18bbe022732a9203e32b7362114f7889d495f40c2e614c12068a71ccb1f687169fad38bf5afa13edc88aa7551f60a9bf0f2b0a559603943c12
SSDEEP
3072:8kK0t3ek+pQrbg6Jl4lEDKwhIwq9d5Vk6PDaLwnPca7ku8lvyXJ1xdZ:V3Pgol0EuL5VJasPcaf8lAXd
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord800
ord1116
ord1176
ord1575
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord858
ord2818
ord3920
ord825
ord535
ord539
ord1601
ord537
ord2614
ord861
ord4277
ord2764
ord5710
ord823
ord860
ord941
ord2915
ord4129
ord6467
ord1131
ord2725
ord3953
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord815
ord4274
ord2864
ord3870
ord6197
ord551
ord1232
ord533
ord5194
ord5465
ord6883
ord1997
ord798
ord6407
ord801
ord541
ord940
ord6282
ord6283
ord6663
ord1228
ord926
ord389
ord5207
ord5356
ord690
ord2393
ord4204
ord939
ord5683
ord924
ord5572
ord4278
ord6877
ord540
strcpy
atol
?terminate@@YAXXZ
malloc
free
strlen
memset
memcmp
_mbscmp
memcpy
__CxxFrameHandler
_local_unwind2
_mbsicmp
sprintf
sscanf
wcslen
atoi
_lrotl
_purecall
realloc
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
_except_handler3
GetModuleHandleA
VirtualProtect
LocalAlloc
LocalFree
HeapDestroy
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
DeleteCriticalSection
InitializeCriticalSection
GetPrivateProfileStringA
GlobalHandle
CreateThread
GetLocalTime
WideCharToMultiByte
GlobalFree
FindResourceA
SizeofResource
LoadResource
LockResource
GetLastError
SetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
WriteFile
CloseHandle
GetModuleFileNameA
GetShortPathNameA
lstrcpyA
lstrcatA
GetFileAttributesA
lstrcmpA
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
lstrlenW
InterlockedDecrement
InterlockedIncrement
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
CharNextA
DefWindowProcA
SetWindowLongA
GetCursorPos
PtInRect
GetDlgItem
IsWindow
DestroyWindow
wsprintfA
GetClassNameA
GetMenu
AdjustWindowRectEx
CreateDialogParamA
RegisterClassExA
SendMessageA
InvalidateRgn
SetCapture
ReleaseCapture
GetClassInfoA
GetParent
GetDC
GetDesktopWindow
ReleaseDC
RedrawWindow
SetWindowPos
BeginPaint
FillRect
EndPaint
GetFocus
CreateDialogIndirectParamA
DefWindowProcW
CallWindowProcW
MoveWindow
ShowWindow
SetParent
IsWindowVisible
ScreenToClient
CreateWindowExA
CallNextHookEx
SetTimer
GetSysColor
CallWindowProcA
GetCaretPos
ClientToScreen
SetFocus
SetWindowRgn
InvalidateRect
TrackMouseEvent
FindWindowExA
KillTimer
GetClientRect
GetPropA
SetWindowsHookExA
GetWindowLongW
SetPropA
SetWindowLongW
RemovePropA
UnhookWindowsHookEx
SetForegroundWindow
GetMessageA
PeekMessageA
TranslateMessage
CreateAcceleratorTableA
DispatchMessageA
GetWindowLongA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetWindow
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
GetWindowRect
IsChild
CombineRgn
DeleteObject
GetStockObject
GetObjectA
GetDeviceCaps
CreateSolidBrush
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreateRectRgn
RegOpenKeyA
RegCreateKeyA
RegEnumKeyExA
RegCreateKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCloseKey
ShellExecuteA
CoTaskMemRealloc
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
ord253
LoadTypeLi
VarUI4FromStr
VariantInit
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
LoadRegTypeLi
SysStringLen
SysAllocStringLen
DispCallFunc
VariantClear
SysAllocString
SysFreeString
RegisterTypeLi
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
InternetOpenA
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
InternetCanonicalizeUrlA
InternetOpenUrlA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ