Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
ead012f21bfc73037419a665ee4d43bc_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead012f21bfc73037419a665ee4d43bc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ead012f21bfc73037419a665ee4d43bc_JaffaCakes118
Size
49KB
MD5
ead012f21bfc73037419a665ee4d43bc
SHA1
20b9a64e4ff0e213946c80156a9ccc02b167d60a
SHA256
48a20fdbb211240c02f33d70a4a04c75cd70d73fe13e07d795fb42006434a04f
SHA512
f5c493d107987faf9de444f01dd20db3e5d92ecac704290e8c07c96dcbeafa5dab0c1709d7292915b5d72f6d1ab2921316c3414fc12814f3b7a0624dee46b724
SSDEEP
1536:Mjv6bh+eSumWEv5xFQiMGv55kAK+wENXr:Ev6bh+TTiiMGvUAKJ2Xr
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenW
GetWindowsDirectoryW
VirtualAlloc
Beep
BindIoCompletionCallback
ClearCommBreak
CreateEventA
CreateJobObjectA
DefineDosDeviceW
DeleteTimerQueueEx
DeleteTimerQueueTimer
DeleteVolumeMountPointW
DnsHostnameToComputerNameW
EndUpdateResourceW
EnumResourceTypesW
EnumSystemCodePagesW
EnumSystemLocalesW
FindFirstChangeNotificationA
FindFirstChangeNotificationW
FindFirstVolumeMountPointW
FindNextFileA
FindNextVolumeMountPointA
FindVolumeMountPointClose
GetAtomNameA
GetCPInfo
GetCPInfoExA
GetCommandLineW
GetConsoleAliasA
GetCurrentProcess
GetCurrentThread
GetDiskFreeSpaceA
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileAttributesW
GetModuleHandleW
GetProcessShutdownParameters
GetShortPathNameW
GetStringTypeW
GetSystemDefaultLCID
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetThreadLocale
GetUserDefaultLangID
GetVolumeInformationA
GlobalDeleteAtom
lstrcpyW
GlobalGetAtomNameW
GlobalMemoryStatus
GlobalSize
GlobalUnWire
HeapCreate
HeapLock
HeapReAlloc
HeapWalk
InitAtomTable
IsBadHugeReadPtr
LocalFileTimeToFileTime
LocalReAlloc
Module32First
Module32NextW
MoveFileExW
OpenJobObjectA
OpenJobObjectW
OutputDebugStringW
PeekConsoleInputA
Process32Next
ReadConsoleInputA
ReadConsoleOutputA
ReadFileScatter
RemoveDirectoryW
ReplaceFileW
SetComputerNameExW
SetConsoleScreenBufferSize
SetCurrentDirectoryW
SetFilePointerEx
SetHandleCount
SetLastError
SetLocaleInfoA
SetTapeParameters
SetThreadAffinityMask
SetVolumeMountPointW
TlsGetValue
UnlockFileEx
VirtualUnlock
WaitForMultipleObjects
WaitForSingleObject
WaitNamedPipeW
WriteConsoleW
WriteFileEx
_lwrite
lstrcpyn
lstrcpynA
GlobalFix
CreateFileW
AppendMenuW
BeginDeferWindowPos
CharUpperBuffA
CheckDlgButton
CloseWindow
CopyAcceleratorTableW
CreateCursor
CreateDesktopA
DdeClientTransaction
DdeEnableCallback
DdeGetData
DdeUninitialize
DestroyMenu
DialogBoxIndirectParamA
DialogBoxIndirectParamW
DialogBoxParamW
DlgDirSelectExW
EnumClipboardFormats
EnumDisplayDevicesA
EnumDisplaySettingsW
EnumPropsA
EnumPropsExA
GetActiveWindow
GetClipboardFormatNameA
GetClipboardFormatNameW
GetClipboardViewer
GetDlgItemInt
GetDlgItemTextA
GetGuiResources
GetKeyNameTextW
GetMessageA
GetNextDlgTabItem
GetParent
GetWindowContextHelpId
GetWindowModuleFileNameA
GetWindowTextA
GetWindowThreadProcessId
IMPGetIMEW
IMPSetIMEA
InvertRect
IsClipboardFormatAvailable
IsDlgButtonChecked
IsIconic
IsRectEmpty
IsWindow
IsZoomed
LoadMenuIndirectW
LoadMenuW
LockSetForegroundWindow
LookupIconIdFromDirectory
MapVirtualKeyExA
MessageBeep
ModifyMenuW
MonitorFromPoint
NotifyWinEvent
PtInRect
RealGetWindowClassW
RedrawWindow
RegisterClassExW
RegisterClipboardFormatA
RegisterClipboardFormatW
ReleaseDC
SendIMEMessageExA
SetClassLongW
SetClipboardData
SetClipboardViewer
SetMenuItemBitmaps
SetMenuItemInfoA
SetMenuItemInfoW
SetPropA
SetRectEmpty
SetSysColors
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
SetWindowsHookExA
SetWindowsHookExW
SystemParametersInfoW
TileChildWindows
ToAscii
TrackPopupMenu
UnhookWindowsHook
UnionRect
UpdateLayeredWindow
VkKeyScanExA
VkKeyScanW
WaitForInputIdle
WinHelpA
LoadIconA
AllowSetForegroundWindow
RegOpenKeyExA
CLSIDFromProgID
CLSIDFromProgIDEx
CoAddRefServerProcess
CoAllowSetForegroundWindow
CoBuildVersion
CoCopyProxy
CoCreateGuid
CoCreateInstanceEx
CoDisconnectObject
CoGetApartmentID
CoGetCallContext
CoGetCancelObject
CoGetInstanceFromFile
CoGetInstanceFromIStorage
CoGetMarshalSizeMax
CoGetTreatAsClass
CoImpersonateClient
CoInitializeSecurity
CoInitializeWOW
CoLockObjectExternal
CoQueryAuthenticationServices
CoQueryClientBlanket
CoQueryReleaseObject
CoRegisterMessageFilter
CoRegisterSurrogateEx
CoReleaseServerProcess
CoResumeClassObjects
CoTaskMemFree
CreateFileMoniker
CreateGenericComposite
CreateObjrefMoniker
DcomChannelSetHResult
FmtIdToPropStgName
GetDocumentBitStg
GetHGlobalFromStream
HACCEL_UserMarshal
HACCEL_UserUnmarshal
HBITMAP_UserFree
HBITMAP_UserSize
HBRUSH_UserMarshal
HBRUSH_UserUnmarshal
HDC_UserSize
HENHMETAFILE_UserFree
HENHMETAFILE_UserUnmarshal
HMENU_UserFree
HMENU_UserUnmarshal
HMETAFILEPICT_UserMarshal
HMETAFILEPICT_UserUnmarshal
HMETAFILE_UserUnmarshal
HkOleRegisterObject
MonikerCommonPrefixWith
MonikerRelativePathTo
OleConvertOLESTREAMToIStorage
OleCreate
OleCreateEmbeddingHelper
OleCreateFromData
OleCreateFromDataEx
OleCreateFromFileEx
OleCreateLinkEx
OleCreateLinkToFileEx
OleGetAutoConvert
OleInitializeWOW
OleLockRunning
OleMetafilePictFromIconAndLabel
OleQueryCreateFromData
OleRegEnumVerbs
OleRegGetMiscStatus
OleRegGetUserType
OleSetContainedObject
OleSetMenuDescriptor
PropStgNameToFmtId
ReadClassStg
ReadClassStm
STGMEDIUM_UserFree
STGMEDIUM_UserMarshal
StgConvertPropertyToVariant
StgCreatePropSetStg
StgCreatePropStg
StgGetIFillLockBytesOnILockBytes
StgIsStorageILockBytes
StgOpenAsyncDocfileOnIFillLockBytes
StgOpenPropStg
StgOpenStorageEx
UpdateDCOMSettings
UtConvertDvtd32toDvtd16
WdtpInterfacePointer_UserSize
WdtpInterfacePointer_UserUnmarshal
WriteFmtUserTypeStg
WriteOleStg
WriteStringStream
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ