Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0f13063e5ce8555f084042107c0a7520_JaffaCakes118.dll
Resource
win7-20240903-en
Target
0f13063e5ce8555f084042107c0a7520_JaffaCakes118
Size
59KB
MD5
0f13063e5ce8555f084042107c0a7520
SHA1
ccec1431bd62dad468d95a32c5a6d5d60f9479aa
SHA256
6e6ba799fb62a23a358b558df7d633cd5ebbfdc88c2fab1051374f780830ac5c
SHA512
7b20d373598ecd59682effe5d8f030da195de9553aea3ebc0a172d68e83410acf9682a0066ad601e50b9576f7ac468e5e8e9197685ce74035cb3805a948fb429
SSDEEP
1536:nJrxTQHRslEMf8vkJ58/Jr41JVBX+JbOC90c:nJdTQVMlJyrsJfX+Jbr
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegFlushKey
RegQueryValueExA
DeleteCriticalSection
lstrcmpiA
LeaveCriticalSection
EnterCriticalSection
lstrcpyW
WideCharToMultiByte
lstrlenW
GetCurrentProcessId
VirtualProtect
VirtualQuery
FlushInstructionCache
GetCurrentProcess
lstrlenA
InitializeCriticalSection
CloseHandle
CreateEventA
DisableThreadLibraryCalls
WaitForSingleObject
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
GetSystemDirectoryA
lstrcmpA
DebugBreak
HeapReAlloc
HeapFree
UnmapViewOfFile
MapViewOfFile
SetLastError
GetCurrentThreadId
ReleaseMutex
CreateMutexA
LocalFree
CreateFileMappingA
SizeofResource
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
VariantChangeTypeEx
VariantInit
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VariantClear
GetWindowThreadProcessId
GetFocus
GetWindowTextW
SendMessageA
SetWindowsHookExA
UnhookWindowsHookEx
EnumWindows
DefWindowProcW
CallWindowProcW
CallWindowProcA
SetWindowLongA
SetWindowLongW
IsWindowUnicode
GetWindowLongA
GetWindowLongW
CharNextA
GetKeyboardType
FindWindowExA
MapWindowPoints
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
DefWindowProcA
CreateWindowExA
CallNextHookEx
GetKeyState
SetWindowTextA
SetFocus
SetWindowTextW
GetPropA
SetPropA
RemovePropA
PostMessageA
IsWindow
RegisterWindowMessageA
GetWindow
GetClassNameA
GetParent
PeekMessageA
DestroyWindow
UnregisterClassA
WSACancelAsyncRequest
WSAStartup
WSAAsyncGetHostByName
WSACleanup
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ