Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d635846306a9eb1f8db145e7dbdd65cd_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d635846306a9eb1f8db145e7dbdd65cd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d635846306a9eb1f8db145e7dbdd65cd_JaffaCakes118
Size
145KB
MD5
d635846306a9eb1f8db145e7dbdd65cd
SHA1
94bde6d1c4922df0c01b03901eb50734f7a52fcf
SHA256
7d603c6a56a75d682bb80c5c6a75ee502058e49f69d0298f65c9c395bb6f0202
SHA512
84d8c8ca7b59d6b71cd064e17859f2c6940dfd5fb6ad02d04400c47877e418a867bc55b08dd494cc6563ce869f609a9e5fe7c472201a3a330a3b241076c2f2f4
SSDEEP
3072:no0rNq6JUEzAKbW7qj+qkYIg72HMWpM8DBvWlPcyY/h:noMUTEW7qj+5Yv72HhDpWlPc7/h
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
GetModuleHandleW
GetModuleFileNameW
GetLastError
MultiByteToWideChar
lstrcpynW
SetEvent
ResetEvent
lstrlenW
CreateThread
WaitForSingleObject
TerminateThread
CloseHandle
CreateEventW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
IsBadReadPtr
GetTempPathW
CreateDirectoryW
OpenFileMappingW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
LoadLibraryExW
GetSystemDirectoryW
ReadProcessMemory
InterlockedDecrement
GetUserDefaultLangID
IsBadStringPtrW
GetCurrentThreadId
GetTickCount
GetCurrentProcessId
lstrcpynA
lstrlenA
lstrcmpW
LoadLibraryA
OutputDebugStringA
GetFileAttributesW
DisableThreadLibraryCalls
GetModuleHandleA
LocalFree
lstrcmpiW
GetVersion
GetVersionExW
GetCurrentProcess
FreeLibrary
GetProcAddress
SetLastError
LoadLibraryW
IsWindowVisible
GetClassInfoW
LoadCursorW
GetClassLongW
SetClassLongW
GetDC
RegisterClassW
DispatchMessageW
SetTimer
PostMessageW
DestroyWindow
InvalidateRect
TranslateMessage
SetWindowPos
IsWindow
GetSystemMetrics
SendMessageW
FillRect
RemovePropW
IsWindowUnicode
SetPropW
GetPropW
DefWindowProcW
GetWindowLongA
CreateWindowExW
GetWindowThreadProcessId
CallWindowProcW
EndPaint
IsRectEmpty
BeginPaint
ReleaseDC
GetWindowLongW
GetWindowRgn
GetSysColor
GetSysColorBrush
CallNextHookEx
GetClassNameA
PtInRect
SetWindowLongW
SetWindowsHookExW
UnhookWindowsHookEx
ShowWindow
GetWindowDC
SetWindowRgn
DrawTextW
InflateRect
LoadImageW
GetWindowRect
SystemParametersInfoW
MapWindowPoints
GetParent
FindWindowExW
ScreenToClient
GetCursorPos
SetCursor
ClientToScreen
KillTimer
GetClientRect
GetWindow
FillRgn
CreateRectRgn
CreatePolygonRgn
DeleteDC
GetObjectW
CreateCompatibleDC
DeleteObject
SetBkMode
CreateSolidBrush
StretchBlt
MoveToEx
LineTo
GetStockObject
SelectObject
CreatePen
SysStringByteLen
SysFreeString
SysAllocString
VariantInit
VariantClear
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
SysAllocStringByteLen
??0bad_alloc@std@@QAE@ABV01@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1bad_alloc@std@@UAE@XZ
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??_7bad_alloc@std@@6B@
?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PAD0PBD1@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
PathAppendW
PathFindFileNameW
wnsprintfA
PathFileExistsW
PathRemoveFileSpecW
PathRemoveBackslashW
PathRemoveBlanksW
PathIsDirectoryW
PathStripToRootW
wnsprintfW
SHGetValueW
SHSetValueW
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
srand
rand
strncpy
strcpy
wcsncpy
memcpy
memcmp
memset
wcslen
wcstombs
_CxxThrowException
??0exception@@QAE@ABQBD@Z
mbstowcs
??0exception@@QAE@ABV0@@Z
malloc
abs
_snwprintf
strcmp
sprintf
time
strlen
_except_handler3
_wcsicmp
_strrev
_adjust_fdiv
_purecall
free
memmove
realloc
__CxxFrameHandler
??2@YAPAXI@Z
atoi
fputc
exit
_iob
calloc
fgetc
InternetCrackUrlW
InternetSetCookieW
InternetReadFile
HttpAddRequestHeadersW
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetCloseHandle
InternetOpenW
htons
ntohl
SHGetSpecialFolderPathW
CoCreateInstance
OleRun
OleInitialize
OleUninitialize
OnButtonMessage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ