Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
0d40257f2abd6635b093c6d4fc119cbb_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0d40257f2abd6635b093c6d4fc119cbb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
0d40257f2abd6635b093c6d4fc119cbb_JaffaCakes118
Size
173KB
MD5
0d40257f2abd6635b093c6d4fc119cbb
SHA1
d5fbaf6c79a95b69f180d24842d9cbbbce578448
SHA256
a95ae8819e1f761884160baf63c53ff794f838fca8ef7e9cc757d5c48ab8b2ed
SHA512
6c50a797740effb7997a55494873bafd34e679d410bcb3e1b3b6f00839277e0fc1de48b5a223fa80d5d339d9cccfe04793a83f935310a3ec9e3a3cf6aaf30aca
SSDEEP
3072:DQqiZ0WCkfxDW68EQR3lfwz1taCdhTigZc6sFsEtCMu46/14V:8qU0WCkY6rQLoiCd9igZcys6/14V
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
QueryPerformanceCounter
VirtualAlloc
GetStartupInfoA
CreateFileW
ReadFile
GetWindowsDirectoryW
GetModuleHandleW
CloseHandle
GetModuleFileNameW
GetCurrentThreadId
GetCurrentProcess
GetCommandLineW
ExitProcess
CreateProcessW
lstrcatW
GetScrollRange
DrawTextA
SetBkColor
TranslateCharsetInfo
TextOutA
SetWindowOrgEx
SetWindowExtEx
SetTextColor
CloseMetaFile
CopyMetaFileA
CreateFontIndirectA
CreateMetaFileA
DeleteObject
SetTextAlign
GetLayout
GetStockObject
GetTextExtentPoint32A
PatBlt
SelectObject
GetDeviceCaps
SetBkMode
SetLayout
GetOpenFileNameA
GetSaveFileNameA
RegQueryValueExA
RegQueryValueA
RegOpenKeyExA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
RegOpenKeyW
RegSetValueA
DragFinish
DragAcceptFiles
DragQueryFileA
ShellExecuteExA
ShellAboutA
ExtractAssociatedIconA
CreateUrlCacheEntryA
DeleteUrlCacheEntry
CommitUrlCacheEntryA
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_vsnprintf
exit
memmove
strchr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ