Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
07197bc744f8676fad05418c5b1226ef_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
07197bc744f8676fad05418c5b1226ef_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
07197bc744f8676fad05418c5b1226ef_JaffaCakes118
Size
46KB
MD5
07197bc744f8676fad05418c5b1226ef
SHA1
387fd9108a37a3f8f03cd1a1dca320243ef02e75
SHA256
93889c9965e7d721da3f52d8439426de96b0a9126f55ff8838377e63007a9493
SHA512
1e1546572cbcaa963fbd26ec8d05741fa15729eaedabdb0e4f0fb84942f156d6fdcc7a7bec782a12f10115f03e2b0f9479019bdb64fa41b07cbba1222c7c329c
SSDEEP
768:TyOJDe/qB46qsm6mD5NQ3aHBA3v45xWbCVQcMWAOJsKohytmH5gJ56f/WpdpqMmg:WmDepum6er/Bv5xHQcMGWKBJgWpdvmg
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CreateFileW
lstrcatW
LoadLibraryW
GetProcAddress
Beep
BindIoCompletionCallback
ClearCommBreak
CreateEventA
CreateJobObjectA
DefineDosDeviceW
DeleteTimerQueueEx
DeleteTimerQueueTimer
DeleteVolumeMountPointW
DnsHostnameToComputerNameW
EndUpdateResourceW
EnumResourceTypesW
EnumSystemCodePagesW
EnumSystemLocalesW
FindFirstChangeNotificationA
FindFirstChangeNotificationW
FindFirstVolumeMountPointW
FindNextFileA
FindNextVolumeMountPointA
FindVolumeMountPointClose
GetAtomNameA
GetCPInfo
GetCPInfoExA
GetCommandLineW
GetConsoleAliasA
GetCurrentProcess
GetCurrentThread
GetDiskFreeSpaceA
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileAttributesW
GetModuleHandleW
GetProcessShutdownParameters
GetShortPathNameW
GetStringTypeW
GetSystemDefaultLCID
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetThreadLocale
GetUserDefaultLangID
GetVolumeInformationA
GlobalDeleteAtom
GlobalFix
GetWindowsDirectoryW
GlobalMemoryStatus
GlobalSize
GlobalUnWire
HeapCreate
HeapLock
HeapReAlloc
HeapWalk
InitAtomTable
IsBadHugeReadPtr
LocalFileTimeToFileTime
LocalReAlloc
Module32First
Module32NextW
MoveFileExW
OpenJobObjectA
OpenJobObjectW
OutputDebugStringW
PeekConsoleInputA
Process32Next
ReadConsoleInputA
ReadConsoleOutputA
ReadFileScatter
RemoveDirectoryW
ReplaceFileW
SetComputerNameExW
SetConsoleScreenBufferSize
SetCurrentDirectoryW
SetFilePointerEx
SetHandleCount
SetLastError
SetLocaleInfoA
SetTapeParameters
SetThreadAffinityMask
SetVolumeMountPointW
TlsGetValue
UnlockFileEx
VirtualUnlock
WaitForMultipleObjects
WaitForSingleObject
WaitNamedPipeW
WriteConsoleW
WriteFileEx
_lwrite
lstrcpyn
lstrcpynA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GlobalGetAtomNameW
VirtualAlloc
IsDebuggerPresent
CreateCursor
CreateDesktopA
DdeClientTransaction
DdeEnableCallback
DdeGetData
DdeUninitialize
DestroyMenu
DialogBoxIndirectParamA
DialogBoxIndirectParamW
DialogBoxParamW
DlgDirSelectExW
EnumClipboardFormats
EnumDisplayDevicesA
EnumDisplaySettingsW
EnumPropsA
EnumPropsExA
GetActiveWindow
GetClipboardFormatNameA
GetClipboardFormatNameW
GetClipboardViewer
GetDlgItemInt
GetDlgItemTextA
GetGuiResources
GetKeyNameTextW
GetMessageA
GetNextDlgTabItem
GetParent
GetWindowContextHelpId
GetWindowModuleFileNameA
GetWindowTextA
GetWindowThreadProcessId
IMPGetIMEW
IMPSetIMEA
InvertRect
IsClipboardFormatAvailable
IsDlgButtonChecked
IsIconic
IsRectEmpty
CopyAcceleratorTableW
IsZoomed
LoadMenuIndirectW
LoadMenuW
LockSetForegroundWindow
LookupIconIdFromDirectory
MapVirtualKeyExA
MessageBeep
ModifyMenuW
MonitorFromPoint
NotifyWinEvent
PtInRect
RealGetWindowClassW
RedrawWindow
RegisterClassExW
RegisterClipboardFormatA
RegisterClipboardFormatW
ReleaseDC
SendIMEMessageExA
SetClassLongW
SetClipboardData
SetClipboardViewer
SetMenuItemBitmaps
SetMenuItemInfoA
SetMenuItemInfoW
SetPropA
SetRectEmpty
SetSysColors
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
SetWindowsHookExA
SetWindowsHookExW
SystemParametersInfoW
TileChildWindows
ToAscii
TrackPopupMenu
UnhookWindowsHook
UnionRect
UpdateLayeredWindow
VkKeyScanExA
VkKeyScanW
WaitForInputIdle
WinHelpA
CloseWindow
CheckDlgButton
AllowSetForegroundWindow
AppendMenuW
BeginDeferWindowPos
CharUpperBuffA
IsWindow
RegOpenKeyExA
CoBuildVersion
CoCreateGuid
CoCreateInstanceEx
CoDisconnectObject
CoGetApartmentID
CoGetCallContext
CoGetCancelObject
CoGetInstanceFromFile
CoGetInstanceFromIStorage
CoGetMarshalSizeMax
CoGetTreatAsClass
CoImpersonateClient
CoInitializeSecurity
CoInitializeWOW
CoLockObjectExternal
CoQueryAuthenticationServices
CoQueryClientBlanket
CoQueryReleaseObject
CoRegisterMessageFilter
CoRegisterSurrogateEx
CoReleaseServerProcess
CoResumeClassObjects
CoTaskMemFree
CreateFileMoniker
CreateGenericComposite
CreateObjrefMoniker
DcomChannelSetHResult
FmtIdToPropStgName
GetDocumentBitStg
GetHGlobalFromStream
HACCEL_UserMarshal
HACCEL_UserUnmarshal
HBITMAP_UserFree
HBITMAP_UserSize
HBRUSH_UserMarshal
HBRUSH_UserUnmarshal
HDC_UserSize
HENHMETAFILE_UserFree
HENHMETAFILE_UserUnmarshal
HMENU_UserFree
HMENU_UserUnmarshal
HMETAFILEPICT_UserMarshal
HMETAFILEPICT_UserUnmarshal
HMETAFILE_UserUnmarshal
HkOleRegisterObject
MonikerCommonPrefixWith
MonikerRelativePathTo
OleConvertOLESTREAMToIStorage
OleCreate
OleCreateEmbeddingHelper
OleCreateFromData
OleCreateFromDataEx
OleCreateFromFileEx
OleCreateLinkEx
OleCreateLinkToFileEx
OleGetAutoConvert
OleInitializeWOW
OleLockRunning
OleMetafilePictFromIconAndLabel
OleQueryCreateFromData
OleRegEnumVerbs
OleRegGetMiscStatus
OleRegGetUserType
OleSetContainedObject
OleSetMenuDescriptor
PropStgNameToFmtId
ReadClassStg
ReadClassStm
STGMEDIUM_UserFree
STGMEDIUM_UserMarshal
StgConvertPropertyToVariant
StgCreatePropSetStg
StgCreatePropStg
StgGetIFillLockBytesOnILockBytes
StgIsStorageILockBytes
StgOpenAsyncDocfileOnIFillLockBytes
StgOpenPropStg
StgOpenStorageEx
UpdateDCOMSettings
UtConvertDvtd32toDvtd16
WdtpInterfacePointer_UserSize
WdtpInterfacePointer_UserUnmarshal
WriteFmtUserTypeStg
WriteOleStg
WriteStringStream
CoAllowSetForegroundWindow
CoAddRefServerProcess
CLSIDFromProgIDEx
CLSIDFromProgID
CoCopyProxy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ