Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
fef0e497a2511ddcea68d05a0d102f7a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fef0e497a2511ddcea68d05a0d102f7a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
fef0e497a2511ddcea68d05a0d102f7a_JaffaCakes118
Size
685KB
MD5
fef0e497a2511ddcea68d05a0d102f7a
SHA1
eb9f4b0406e552f9f09c0cf496e4c9c5cc8a6e69
SHA256
7b1ef23837a08dc1c812c372aa90f933279b84b107c8d15e321ed2ad84511d10
SHA512
61bc4410cefb881f99dfeb8201c762425fb3c60e3a79e8a642fb04dda9e437c5574de1b6c844ec09c9c8980f68017417185e3738c1428432aed7c3bb5971953d
SSDEEP
12288:gYvtyKb/LiRGYDaa3NRIBycRL2bFddUVrKsMJna/UIW:pvvbrYDoycN2bFdWVrKsgn/
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Users\Matthew\WorkCode\SpyFrame\trunk\release\SpyCleaner.pdb
UuidCreate
Tcl_EvalEx
Tcl_CreateCommand
Tcl_SetResult
Tcl_SplitList
Tcl_GetStringResult
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
LocalAlloc
TlsAlloc
TlsFree
FlushFileBuffers
VirtualAlloc
VirtualFree
GetModuleFileNameA
GetVersionExA
GetOverlappedResult
WritePrivateProfileStringA
GetModuleHandleA
GetWindowsDirectoryA
TerminateProcess
CreateNamedPipeA
CopyFileA
GetFileTime
FileTimeToSystemTime
GetSystemInfo
RaiseException
GetStdHandle
GetLocalTime
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
GetThreadLocale
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetCurrentThreadId
WaitForSingleObject
GlobalGetAtomNameA
FileTimeToLocalFileTime
GetModuleFileNameW
InterlockedDecrement
GlobalReAlloc
GlobalHandle
LocalReAlloc
SetLastError
InterlockedIncrement
lstrcmpA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualQuery
HeapReAlloc
GetCommandLineA
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
ExitProcess
RtlUnwind
HeapSize
GetACP
IsValidCodePage
SetHandleCount
GetStartupInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
SetFilePointer
WriteFile
ReadFile
TlsSetValue
SleepEx
TlsGetValue
ConnectNamedPipe
GetProcessHeap
FindClose
FindNextFileA
GetFileAttributesA
FindFirstFileA
GetBinaryTypeA
CreateDirectoryA
QueryDosDeviceA
GetFileSize
OpenProcess
CreateFileA
GetCurrentProcessId
MoveFileExA
SetFileAttributesA
lstrlenA
DeleteCriticalSection
GetCurrentProcess
GetVersion
InterlockedExchange
CompareStringW
CompareStringA
MoveFileA
CreateIoCompletionPort
GetDriveTypeA
LocalFree
GetLogicalDrives
FormatMessageA
DeleteFileA
Sleep
LeaveCriticalSection
EnterCriticalSection
CloseHandle
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
InitializeCriticalSection
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
FreeLibrary
GetProcAddress
LoadLibraryA
GetLastError
MultiByteToWideChar
LockResource
WideCharToMultiByte
ExpandEnvironmentStringsA
SizeofResource
LoadResource
FindResourceA
SetErrorMode
SetEnvironmentVariableA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
GetFileTitleA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
PIEDelete
PIEInit
PIENew
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ