Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
e060fec4df6911e793a07a9f335aa3d6_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e060fec4df6911e793a07a9f335aa3d6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
e060fec4df6911e793a07a9f335aa3d6_JaffaCakes118
Size
90KB
MD5
e060fec4df6911e793a07a9f335aa3d6
SHA1
38355bb2828c801b20891bf84dfe2b2bb6055ec4
SHA256
c574b863c0914f99a5dacbd25b9d01e583013aff24ecf55cf6e47986c3f42469
SHA512
5b139e889b5a11c912d17b1d000caf234e420249762b4219396ea5023cd01a7b72ba5bc174eb0aa291f6f40b8a8a5bad59c297bde6d6b3895ab8d46597762756
SSDEEP
1536:mYWG58WVMvbGwWB/K3EZtA0rGo++lPGsi47zCV4ikC90eT:ZWGBVMvbqZNlesi47+4+x
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
GetProcAddress
LoadLibraryA
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
CreateFileA
ReadFile
WriteFile
SetFilePointer
GetFileTime
SetFileTime
GetFileAttributesA
MoveFileA
DeleteFileA
SetFileAttributesA
GetFileSize
CreateDirectoryA
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
HeapCreate
GetWindowsDirectoryA
SearchPathA
GetCurrentProcessId
VirtualProtect
VirtualQuery
LocalFree
SetLastError
GetSystemDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetDriveTypeA
GetCommandLineA
CreateFileMappingA
DuplicateHandle
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
DebugBreak
HeapReAlloc
HeapFree
LockResource
FormatMessageA
CreateProcessA
GetVersionExA
GetSystemInfo
HeapAlloc
DisableThreadLibraryCalls
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FindResourceA
LoadResource
CreateMutexA
SizeofResource
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
InterlockedIncrement
lstrcmpA
GetTickCount
lstrcatA
GetLastError
lstrcmpiA
MultiByteToWideChar
lstrcpyA
lstrlenA
lstrlenW
WideCharToMultiByte
WaitForSingleObject
ReleaseMutex
CloseHandle
CompareStringA
GetDC
ReleaseDC
InvalidateRect
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
SetWindowPos
IsWindow
GetParent
SetFocus
GetFocus
EndPaint
LoadCursorA
RegisterClassExA
CreateWindowExA
CallWindowProcA
DefWindowProcW
GetClientRect
BeginPaint
EnumWindows
GetClassNameA
wsprintfA
CharNextA
DefWindowProcA
DestroyWindow
ShowWindow
SetWindowLongA
GetWindowLongA
GetWindowThreadProcessId
PostMessageA
PeekMessageA
GetDesktopWindow
GetWindowRect
AdjustWindowRect
LoadStringA
UnregisterClassA
GetKeyboardType
GetWindowLongW
SetWindowLongW
CallWindowProcW
GetClassInfoExA
IsChild
CreateDCA
GetDeviceCaps
LPtoDP
SaveDC
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
RestoreDC
CreateRectRgnIndirect
CryptGetUserKey
CryptEncrypt
CryptImportKey
CryptExportKey
CryptGenKey
CryptDeriveKey
CryptSignHashA
RegCreateKeyA
RegFlushKey
RegQueryValueExA
GetUserNameA
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
CryptDecrypt
SHGetDesktopFolder
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
CreateOleAdviseHolder
CoCreateInstance
OleRegGetMiscStatus
OleRegGetUserType
OleRegEnumVerbs
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringByteLen
SysAllocStringByteLen
VariantClear
VariantInit
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
RegisterTypeLi
OleCreatePropertyFrame
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ