Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
eae399ddc9a7da32e182c32d1a346ff1_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eae399ddc9a7da32e182c32d1a346ff1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
eae399ddc9a7da32e182c32d1a346ff1_JaffaCakes118
Size
298KB
MD5
eae399ddc9a7da32e182c32d1a346ff1
SHA1
983b910a38ecbaa1c26aa9774b98fe08e230d70c
SHA256
d777c2e077a5c9c5db3bc21114f26199f95db313e39f314636d847d842a2cf07
SHA512
0c62691f3546438e486b9efa4db201b45d148b2fccb8badf751077b1d4c3379482866be3fa1cce81cdd44d79fee05a6f9a3cdb726ef93e8229decd033c71311e
SSDEEP
6144:bRO2NrDBtMo0SruwEysCh2fMnw7H176aa1R:bQ6rNtD0SruVrCh28aGR
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
e:\110301_164209_build_Client_Build_StPauliGirl_10.0.666.0\source\source_sa\bin\ClickPotatoLite_Release\ClickPotatoLiteSAAX.pdb
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegSetValueExA
RegQueryInfoKeyW
RegEnumKeyExA
RegQueryInfoKeyA
OpenProcessToken
OpenThreadToken
CopySid
GetLengthSid
IsValidSid
GetTokenInformation
ConvertSidToStringSidA
CryptReleaseContext
CryptCreateHash
CryptDestroyHash
CryptDeriveKey
CryptDestroyKey
CryptDecrypt
CryptHashData
LookupAccountNameA
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
RegQueryValueExA
CryptAcquireContextA
GetModuleFileNameA
FreeLibrary
FindResourceA
LoadLibraryExA
GetTickCount
SystemTimeToTzSpecificLocalTime
IsBadWritePtr
IsBadReadPtr
OutputDebugStringA
GetModuleHandleW
SetThreadLocale
GetThreadLocale
GlobalAddAtomA
GetCurrentProcess
GetCurrentThread
CloseHandle
LocalFree
FileTimeToSystemTime
SystemTimeToFileTime
GetTimeFormatA
GetDateFormatA
SetLastError
GetSystemTime
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
ReleaseMutex
SetEvent
WaitForSingleObject
OpenEventA
OpenMutexA
ReadFile
CreateFileA
LoadLibraryA
GetVersion
DeleteFileA
WriteFile
GetVersionExA
LocalAlloc
RemoveDirectoryA
SetFileAttributesA
GetFileAttributesA
GetFileSize
GetTempPathA
GetTempFileNameA
GetPrivateProfileStringA
OpenFile
GetShortPathNameA
SetFilePointer
LeaveCriticalSection
GetComputerNameA
GetVolumeInformationA
SetErrorMode
GetDriveTypeA
lstrcpyA
GetComputerNameExA
GetSystemDirectoryA
GetOEMCP
GetACP
GetUserDefaultLangID
GetSystemDefaultLangID
DosDateTimeToFileTime
GetProcessHeap
HeapFree
HeapAlloc
InterlockedExchange
CopyFileA
InitializeCriticalSection
GetCurrentThreadId
ResumeThread
CreateThread
FormatMessageA
lstrcmpA
GetSystemTimeAsFileTime
GetTimeZoneInformation
LoadLibraryW
CreateMutexA
FlushFileBuffers
CreateFileW
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
LCMapStringW
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
SetHandleCount
Sleep
GetStringTypeW
IsProcessorFeaturePresent
HeapCreate
GetModuleFileNameW
GetStdHandle
ExitProcess
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetCPInfo
RtlUnwind
GetCommandLineA
EnterCriticalSection
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
lstrcmpiA
lstrlenA
GetModuleHandleA
GetProcAddress
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
EncodePointer
DecodePointer
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapDestroy
HeapReAlloc
HeapSize
CharNextA
GetDesktopWindow
CharNextW
PostMessageA
FindWindowA
SendMessageA
RegisterWindowMessageA
GetClassNameA
EnumChildWindows
ShellExecuteExA
CoTaskMemFree
IIDFromString
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
StringFromGUID2
SysFreeString
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocStringLen
VarUI4FromStr
SysStringLen
LoadRegTypeLi
LoadTypeLi
SysAllocString
UnRegisterTypeLi
SysStringByteLen
SysAllocStringByteLen
RegisterTypeLi
UnloadUserProfile
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
UuidCreate
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ