Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
14b04338526c8a6c208157fb8453e79c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14b04338526c8a6c208157fb8453e79c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
14b04338526c8a6c208157fb8453e79c_JaffaCakes118
Size
193KB
MD5
14b04338526c8a6c208157fb8453e79c
SHA1
321dccfffd240b721fbbd724a05a496a399dd60b
SHA256
e406d666509d49fff31d6535ea4b101d921133ac480353609d933af2e790fa39
SHA512
c982b6c4b2002a7502ee99e1d4385699f09787afb51bbcb70877b2c1dae60e1d2b542bf8d00595a59ad1f647a0b42e99ffd002717ae59917300f84558d7484c7
SSDEEP
3072:cL7uSjVApjwRRUHQs/I1C36pKUYJtph0Nphnw5sg0WenXJqN8Tf/6G:0u6OpuCHDAE3gGPph0Nbng/0WeXTf/N
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
OpenEventW
QueryPerformanceCounter
SetEvent
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForMultipleObjects
LocalFree
lstrcmpA
lstrcmpW
lstrcmpiW
lstrcpyW
lstrlenA
lstrlenW
ReadFile
LoadLibraryA
LocalAlloc
GetWindowsDirectoryW
GetVersionExW
GetTickCount
GetSystemWindowsDirectoryW
GetSystemTimeAsFileTime
GetStartupInfoA
GetProcAddress
GetNumberFormatW
GetModuleHandleA
GetLastError
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCommandLineW
CreateThread
CreateMutexW
CreateEventW
lstrcatW
CloseHandle
GetStockObject
RegOpenKeyA
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExW
RegCloseKey
OpenThreadToken
OpenProcessToken
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
AddAccessAllowedAce
RegOpenKeyW
__p__fmode
__set_app_type
_except_handler3
__p__commode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ