Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
eb7022a733078c97e32b518fcb24919c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb7022a733078c97e32b518fcb24919c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
eb7022a733078c97e32b518fcb24919c_JaffaCakes118
Size
61KB
MD5
eb7022a733078c97e32b518fcb24919c
SHA1
b847567f8cba2e1680ad3f9bf1c980ac05b98d4a
SHA256
45ece0a7e9003fffcc27a324e8f87395ba1b47d80dc8eab2e1105903a9b4d37e
SHA512
d782d9867a080cb9f5582deebd6a89c4f9bfb29e63c65c608c3ba381d894f8c1ca20730422aba0dcecd6bef11c3daa61a27926d659540288375f3865ddc8658f
SSDEEP
768:3rkFZFTiBuiRnZiI+/6PZUMhOK2HgJXB9PRs/3Jt3cYdJ/xu0zCxLWhbCC:3rkFZWRZiIAsPYHgTwP3rdJ5uvxaxC
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegOpenKeyExA
RegEnumKeyExA
RegFlushKey
RegQueryValueExA
DeleteCriticalSection
lstrcmpiA
LeaveCriticalSection
EnterCriticalSection
lstrcpyW
WideCharToMultiByte
lstrlenW
GetCurrentProcessId
lstrlenA
VirtualProtect
VirtualQuery
InitializeCriticalSection
GetCurrentProcess
LockResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcpyA
GetModuleFileNameA
MultiByteToWideChar
SizeofResource
GetLastError
lstrcpynA
IsDBCSLeadByte
FlushInstructionCache
CreateEventA
CloseHandle
DisableThreadLibraryCalls
WaitForSingleObject
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
InterlockedIncrement
InterlockedDecrement
HeapDestroy
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
lstrcmpA
GetModuleHandleA
DebugBreak
HeapReAlloc
HeapFree
SetLastError
CreateFileMappingA
LocalFree
CreateMutexA
ReleaseMutex
GetCurrentThreadId
MapViewOfFile
UnmapViewOfFile
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CLSIDFromString
SysFreeString
SysAllocString
LoadTypeLi
RegisterTypeLi
VariantInit
VariantChangeTypeEx
VariantClear
SetWindowsHookExA
UnhookWindowsHookEx
EnumWindows
DefWindowProcW
CallWindowProcW
CallWindowProcA
SetWindowLongA
SetWindowLongW
IsWindowUnicode
SendMessageA
GetWindowLongW
CharNextA
GetWindowThreadProcessId
wsprintfA
RegisterClassExA
DefWindowProcA
CreateWindowExA
PeekMessageA
GetWindowTextW
GetWindowLongA
GetFocus
DestroyWindow
RemovePropA
PostMessageA
IsWindow
RegisterWindowMessageA
GetWindow
GetClassNameA
GetParent
CallNextHookEx
GetKeyState
SetWindowTextA
SetFocus
SetWindowTextW
GetPropA
LoadCursorA
GetClassInfoExA
MapWindowPoints
FindWindowExA
GetKeyboardType
SetPropA
UnregisterClassA
WSACleanup
WSAAsyncGetHostByName
WSACancelAsyncRequest
WSAStartup
UuidFromStringA
UuidFromStringW
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ