Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
dceadb07ff01e087c3c1a9f35d0ba247_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dceadb07ff01e087c3c1a9f35d0ba247_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dceadb07ff01e087c3c1a9f35d0ba247_JaffaCakes118
Size
686KB
MD5
dceadb07ff01e087c3c1a9f35d0ba247
SHA1
3ed88c646bc6abef2d9b054713b0ff959e2ecbe8
SHA256
456aaa6a659fca1c389ced95cb7e92ed204047135020f989955cfed61a0c7366
SHA512
aaeb13d72f88cc21fc7a40c7e54e4f322a3fc049a3cb7b279215755233fa53b819d5569bec691200269dae1431f77cdd3bb6b47fc76a0e2943d397354d119514
SSDEEP
6144:WalZlqQeTNs00gFXxC6NhSWzS8i+tfILOfiXkkkAc0Bl3Yvniybct9ID0mBmJ1V6:WaA3TNsBgFXDbzf4XkkkSkBmJ1kIPSF
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\bt\11\src\client\obfuscate\obj\i386\oWgaLogon.PDB
HeapFree
OpenProcess
CreateProcessW
GetExitCodeProcess
WaitForMultipleObjects
CreateEventW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LocalFree
FreeLibrary
GetProcessHeap
HeapAlloc
SetLastError
GetSystemDefaultLCID
GetSystemDirectoryA
FlushFileBuffers
GetSystemInfo
VirtualProtect
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetLocaleInfoA
TryEnterCriticalSection
GetExitCodeThread
CreateThread
WaitForSingleObject
GetCurrentThreadId
GetSystemDirectoryW
OpenEventW
SetEvent
GetTempPathA
CreateFileA
WriteFile
CloseHandle
GetProcAddress
GetLastError
LCMapStringW
LCMapStringA
GetACP
InterlockedExchange
MultiByteToWideChar
SetFilePointer
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
GetCPInfo
GetOEMCP
HeapSize
IsBadWritePtr
VirtualAlloc
GetCommandLineA
GetVersionExA
HeapReAlloc
ExitProcess
GetModuleHandleA
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualQuery
GetSystemTime
GetVersion
CreateEventA
Sleep
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetClassLongW
LoadStringA
DrawIconEx
SetWindowRgn
SendMessageW
GetDlgCtrlID
FindWindowA
PostQuitMessage
EqualRect
DestroyWindow
LoadImageW
FillRect
EnumChildWindows
GetSysColor
MapWindowPoints
SetRect
ReleaseDC
EndPaint
BeginPaint
GetClientRect
GetWindowRect
SetWindowPos
LoadStringW
GetDlgItem
KillTimer
SetTimer
SetWindowTextW
GetWindowLongW
EndDialog
PostMessageW
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
DialogBoxParamW
CreateDialogParamW
IsWindow
ShowWindow
SetWindowLongW
UnregisterClassW
GetSystemMetrics
GetWindowTextW
RegCreateKeyExW
CreateProcessAsUserW
LookupAccountNameW
EqualSid
RegQueryValueExW
RegSetValueExW
RegCreateKeyExA
RegCloseKey
RegSetValueExA
CreateRoundRectRgn
SetDCPenColor
RoundRect
SetTextColor
SetBkMode
GetStockObject
CreateBrushIndirect
DeleteObject
CreateCompatibleDC
SelectObject
BitBlt
StretchBlt
GetObjectW
CreateFontIndirectW
CoCreateInstance
CLSIDFromProgID
CoUninitialize
CoInitializeEx
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VariantClear
VariantInit
SysFreeString
SysStringLen
CryptProtectData
CryptUnprotectData
PathCombineA
PathCombineW
WTSEnumerateProcessesW
WTSFreeMemory
WLEventDisconnect
WLEventLock
WLEventLogoff
WLEventLogon
WLEventPostShell
WLEventReconnect
WLEventShutdown
WLEventStartScreenSaver
WLEventStartShell
WLEventStartup
WLEventStopScreenSaver
WLEventUnlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ