Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
aa4bb1b0e567749c158f15b91ae2081f_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa4bb1b0e567749c158f15b91ae2081f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
aa4bb1b0e567749c158f15b91ae2081f_JaffaCakes118
Size
90KB
MD5
aa4bb1b0e567749c158f15b91ae2081f
SHA1
b6e53a64791a008d31017d0bcb849a6578452d3f
SHA256
fea444692531d934900c03153e24170128b28cccdb1cf77bee433589cf11d8e3
SHA512
312b909c9f29a87c32866792596754c00689e78330b7c294837aef7932e7f7021521402d6df44791412f9bc1b085eedb79fce096a78b5a80a2a78147a6cf451a
SSDEEP
1536:DONx3L4A01nkldK+gXavCg57b5oW+QSlC90G:DOX4nnAthd5J+QSAL
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrlenW
lstrcatA
lstrcmpiW
CompareFileTime
SystemTimeToFileTime
GetLocalTime
CreateThread
DebugBreak
HeapReAlloc
HeapFree
DeleteFileA
CloseHandle
FlushFileBuffers
WriteFile
CreateFileA
SetLastError
InterlockedDecrement
EnterCriticalSection
LocalFree
SetThreadPriority
InterlockedIncrement
DisableThreadLibraryCalls
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
GetVersionExA
GetSystemInfo
HeapAlloc
lstrcpyA
ResumeThread
ResetEvent
UnmapViewOfFile
CreateMutexA
CreateFileMappingA
ReleaseMutex
SetEvent
GetCommandLineA
GetFileSize
ReadFile
GetDriveTypeA
GetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetSystemDirectoryA
WaitForMultipleObjects
WaitForSingleObject
GetCurrentProcessId
lstrcmpA
VirtualProtect
VirtualQuery
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetTickCount
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
CreateEventA
WritePrivateProfileSectionA
CreateDirectoryA
MapViewOfFile
CharNextA
SetTimer
DestroyWindow
EnumWindows
GetClassNameA
GetWindowThreadProcessId
PostMessageA
IsWindow
PeekMessageA
DefWindowProcW
SetWindowLongA
CallWindowProcW
CallWindowProcA
CreateWindowExA
DefWindowProcA
SetWindowLongW
GetWindowLongA
GetWindowLongW
RegisterClassExA
wsprintfA
LoadCursorA
GetClassInfoExA
GetKeyboardType
UnregisterClassA
KillTimer
RegCreateKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegFlushKey
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
VariantChangeTypeEx
SysStringByteLen
VariantInit
VariantClear
SysAllocStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ