Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d56e4c1c59dd78add6bcfa3effd6a93d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d56e4c1c59dd78add6bcfa3effd6a93d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d56e4c1c59dd78add6bcfa3effd6a93d_JaffaCakes118
Size
61KB
MD5
d56e4c1c59dd78add6bcfa3effd6a93d
SHA1
4f009effa6106fd940e41113f6c26b198bb37b6e
SHA256
4523f9ccc3d2f814f5146c0d01893f7e08c5dcd39740ad67e485ae72ffd9e78d
SHA512
3c10832af9fc7c9de33a02daad669ea138d993057c2b67040b1f023a4db00a44fb30ce7481828f6972d1d2f4aa93de11f4ed6bcd275c35f298a341ede6edbcc2
SSDEEP
768:Cag3Mw6yaLM61LrioWj8PoiLTx52LLAbN:3RAqHioWj0p5+AN
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
e:\070717_050839_build_MIR\Client_Build_MIR_10_0_327\compile\source_sa\Bin\release\LaunchHelp.pdb
DisableThreadLibraryCalls
GetModuleHandleA
GetVersionExA
CloseHandle
GetProcAddress
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetCurrentProcess
GetModuleHandleExA
GetCurrentThreadId
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WriteFile
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
MultiByteToWideChar
GetLocaleInfoA
SendMessageA
SetWindowsHookExA
UnhookWindowsHookEx
FindWindowA
RegisterWindowMessageA
CallNextHookEx
OpenProcessToken
GetTokenInformation
ShellExecuteExA
GetElevationType
IsElevated
IsVista
IsWow64
MyShellExec
RunElevated
RunNonElevated
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ