Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
dc138b53621030b7b0def57913d56f0e_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc138b53621030b7b0def57913d56f0e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dc138b53621030b7b0def57913d56f0e_JaffaCakes118
Size
90KB
MD5
dc138b53621030b7b0def57913d56f0e
SHA1
0dbb74533e2de77fc11c4852c3cda5c97d0f776e
SHA256
132cb4d87006b8f6db7ec67bfe65a81d930181c825bf0ce95ccf4fab3b27f185
SHA512
5ce10f8aee325dd965a5397f5f8e12013ade0f36e1313837baf2dfdc541686659bfaec6cc7208ef58c6990c62baa6ceeaf24e305de9af0c6d846a11fd3a61a75
SSDEEP
1536:DONx3L4A01nkldK+gXavCg57b5oW+QSlC90i:DOX4nnAthd5J+QSAP
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrlenW
lstrcatA
lstrcmpiW
CompareFileTime
SystemTimeToFileTime
GetLocalTime
CreateThread
DebugBreak
HeapReAlloc
HeapFree
DeleteFileA
CloseHandle
FlushFileBuffers
WriteFile
CreateFileA
SetLastError
InterlockedDecrement
EnterCriticalSection
LocalFree
SetThreadPriority
InterlockedIncrement
DisableThreadLibraryCalls
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
GetVersionExA
GetSystemInfo
HeapAlloc
lstrcpyA
ResumeThread
ResetEvent
UnmapViewOfFile
CreateMutexA
CreateFileMappingA
ReleaseMutex
SetEvent
GetCommandLineA
GetFileSize
ReadFile
GetDriveTypeA
GetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetSystemDirectoryA
WaitForMultipleObjects
WaitForSingleObject
GetCurrentProcessId
lstrcmpA
VirtualProtect
VirtualQuery
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetTickCount
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
CreateEventA
WritePrivateProfileSectionA
CreateDirectoryA
MapViewOfFile
CharNextA
SetTimer
DestroyWindow
EnumWindows
GetClassNameA
GetWindowThreadProcessId
PostMessageA
IsWindow
PeekMessageA
DefWindowProcW
SetWindowLongA
CallWindowProcW
CallWindowProcA
CreateWindowExA
DefWindowProcA
SetWindowLongW
GetWindowLongA
GetWindowLongW
RegisterClassExA
wsprintfA
LoadCursorA
GetClassInfoExA
GetKeyboardType
UnregisterClassA
KillTimer
RegCreateKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegFlushKey
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
VariantChangeTypeEx
SysStringByteLen
VariantInit
VariantClear
SysAllocStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ