Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
bf983ee60aec6377f322d4e5b138ff3d_JaffaCakes118.dll
Resource
win7-20240704-en
Target
bf983ee60aec6377f322d4e5b138ff3d_JaffaCakes118
Size
482KB
MD5
bf983ee60aec6377f322d4e5b138ff3d
SHA1
d942c481bcc8d18b751ac6376c7c64d7815df36a
SHA256
e5907648d96eec13f3f2065e8d5c016c61139c65fc063b0eb1ae5415bd5c28dd
SHA512
fa256e0b47f9124a7370f5004e94c4990658ab9bc26f5aedba0818a4c0849ce80865db90de6009c9da4187152c346995b5827dc8a82699e52beb55a2f2de7093
SSDEEP
6144:qjIoLRn9cLrFMiHhWtsV+6L22GjDghJ+GGYpC+739auFJM23sdVB8EoG:iFnWLreghWtx8XGjDOTGYptaDVB8Ex
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
URLDownloadToCacheFileA
InternetOpenA
InternetSetCookieA
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetGetCookieA
inet_ntoa
gethostbyname
WSAStartup
WSACleanup
SetStdHandle
GetConsoleMode
GetConsoleCP
LoadLibraryW
GetProcAddress
GetModuleHandleA
lstrlenA
InterlockedDecrement
InterlockedIncrement
DebugBreak
OutputDebugStringA
LoadLibraryA
GetLastError
LocalFree
FormatMessageA
SetLastError
WideCharToMultiByte
MultiByteToWideChar
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
CloseHandle
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
lstrcmpiA
DisableThreadLibraryCalls
GetModuleFileNameA
GetModuleHandleW
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
FlushFileBuffers
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
CreateThread
WaitForSingleObject
Sleep
InitializeCriticalSection
GetVersion
ExpandEnvironmentStringsA
GetUserDefaultLCID
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
SetHandleCount
GetTimeZoneInformation
HeapDestroy
HeapCreate
GetModuleFileNameW
GetStdHandle
ExitProcess
HeapSize
GetStringTypeW
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
WriteConsoleW
SetEndOfFile
CreateFileW
CompareStringW
SetEnvironmentVariableA
GetStringTypeExA
LCMapStringA
GetSystemTimeAsFileTime
GetLocalTime
RtlUnwind
LoadLibraryExA
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualProtect
DecodePointer
EncodePointer
InterlockedExchange
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
HeapReAlloc
wvsprintfA
CharNextW
CallWindowProcA
UnregisterClassA
CharNextA
LoadStringA
KillTimer
SendMessageA
PostMessageA
DestroyWindow
FindWindowExA
CharLowerA
RegisterClassExA
CreateWindowExA
LoadCursorA
GetClassInfoExA
MessageBoxA
SetWindowLongA
SetTimer
DefWindowProcA
GetWindowLongA
RegQueryInfoKeyA
RegQueryInfoKeyW
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
ShellExecuteExA
SHGetFolderPathA
ShellExecuteA
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CLSIDFromProgID
CoCreateGuid
VariantChangeType
SysAllocStringLen
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
DispCallFunc
VariantClear
VariantInit
SysStringLen
SysFreeString
SysAllocString
VariantCopy
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ