Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
d21b6fb8a40cb7dd548d27d02885c43d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d21b6fb8a40cb7dd548d27d02885c43d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d21b6fb8a40cb7dd548d27d02885c43d_JaffaCakes118
Size
84KB
MD5
d21b6fb8a40cb7dd548d27d02885c43d
SHA1
e4648fafccb88bae7c6b2c3f8b70bd52a9864b3c
SHA256
1ad228e3f3039ebc46715f8c58989dd6e6bcafe03668748e1fc072cb931f3a5b
SHA512
45690112214d54c7bec09a87be4bdb4b4c2a2eef8ed1f6c31b4fdf4a61af6a09081a4895600e47081fb75cb3eeedf4bda0adeb08361f1a9bf6586fa7aa4224f5
SSDEEP
768:xSYcHVL0ZZ0d1XJZgCQp6kmcpSjbqpOow/Sx0aiJ1y3RqXXmVkNb+1ObC90LUD:xSBVLMKgCQpVmcfjx/RqXXz+OC90o
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
InterlockedDecrement
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
SizeofResource
LoadResource
FindResourceA
GetLastError
InterlockedIncrement
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
lstrcpyA
lstrcatA
CreateThread
DebugBreak
HeapReAlloc
HeapFree
lstrcmpA
SetLastError
LeaveCriticalSection
DeleteCriticalSection
LocalFree
InitializeCriticalSection
HeapCreate
GetVersionExA
GetSystemInfo
HeapAlloc
LoadLibraryA
GetProcAddress
FreeLibrary
LoadLibraryExA
DisableThreadLibraryCalls
ReleaseMutex
SetEvent
ResetEvent
SetThreadPriority
CloseHandle
CreateMutexA
CreateEventA
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
VirtualQuery
VirtualProtect
GetCurrentProcessId
GetCommandLineA
GetDriveTypeA
GetFileAttributesA
WaitForSingleObject
WaitForMultipleObjects
ResumeThread
SetWindowLongA
wsprintfA
UnregisterClassA
GetClassInfoExA
GetKeyboardType
DestroyWindow
EnumWindows
GetClassNameA
GetWindowThreadProcessId
PostMessageA
IsWindow
PeekMessageA
DefWindowProcW
CharNextA
CallWindowProcW
CallWindowProcA
CreateWindowExA
DefWindowProcA
SetWindowLongW
GetWindowLongA
GetWindowLongW
RegisterClassExA
LoadCursorA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
RegFlushKey
RegEnumValueA
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
SysAllocStringLen
VariantClear
VariantInit
RegisterTypeLi
LoadTypeLi
SysAllocString
VarUI4FromStr
SysStringLen
LoadRegTypeLi
SysFreeString
VarDateFromStr
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ