Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
14dcf3b6d73b7b20e816d25d0558f9b9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14dcf3b6d73b7b20e816d25d0558f9b9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
14dcf3b6d73b7b20e816d25d0558f9b9_JaffaCakes118
Size
119KB
MD5
14dcf3b6d73b7b20e816d25d0558f9b9
SHA1
c77bcde0cc211bef4e41057e823e0436c69a24fb
SHA256
7d8b5ee6db3c93980f936d6c1d3ad515d229a4a7dced9ec13d9de3ab1f39aabc
SHA512
a7492d12f65953964a607ae8d306cd9fc355cbdff27e3c26947aedaf8cf3e0c1027b09d57b34447c4cda95106aa0fc344763f0d1cf0140d4c4a94eba79e06590
SSDEEP
1536:G9SJXEMLftelvnh7sJkYjpcz/k30qv3C90ei:4u9LkVS3jpcQEGW
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegFlushKey
RegQueryValueExA
SelectObject
GetStockObject
SetBkMode
SetTextColor
DeleteObject
OffsetRgn
CombineRgn
CreateRectRgn
OffsetWindowOrgEx
SetWindowOrgEx
WaitForSingleObject
CloseHandle
OpenMutexA
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
LeaveCriticalSection
EnterCriticalSection
lstrcpyA
lstrlenW
WideCharToMultiByte
lstrcatW
lstrcpyW
lstrcatA
GetCurrentThreadId
VirtualProtect
VirtualQuery
FlushInstructionCache
GetCurrentProcess
DisableThreadLibraryCalls
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
InterlockedIncrement
ReleaseMutex
MultiByteToWideChar
SetEvent
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpynW
CreateMutexA
CreateEventA
SetLastError
ResetEvent
OpenEventA
lstrcmpiW
DebugBreak
HeapReAlloc
HeapFree
CreateProcessA
WaitForMultipleObjects
LocalFree
lstrcmpA
GetCurrentProcessId
UnmapViewOfFile
InterlockedDecrement
CreateFileMappingA
OpenFileMappingA
MapViewOfFile
GetShortPathNameA
CLSIDFromProgID
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoInitialize
CoUninitialize
CoCreateInstance
RegisterTypeLi
VariantClear
VariantChangeTypeEx
VariantInit
LoadRegTypeLi
SysAllocStringLen
SysStringLen
SysAllocString
SysFreeString
LoadTypeLi
BeginPaint
GetWindowRect
ChildWindowFromPointEx
ScreenToClient
GetCursorPos
InvalidateRect
SetWindowPos
GetClientRect
ShowWindow
SetCapture
ReleaseCapture
PtInRect
GetCapture
CreateWindowExA
GetMessageTime
GetMessagePos
LoadImageA
EndPaint
PostMessageA
SetWindowRgn
IsRectEmpty
CopyRect
DefWindowProcW
RegisterClassExA
GetClassInfoExA
SetWindowLongA
GetWindowLongA
CallWindowProcA
SetWindowLongW
IsWindowUnicode
CallWindowProcW
GetWindowLongW
wsprintfA
LoadCursorA
CharNextA
DrawIconEx
GetParent
MapWindowPoints
SendMessageA
IsWindow
DestroyWindow
SetRectEmpty
DefWindowProcA
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageA
GetKeyboardType
DrawTextA
EnumWindows
GetClassNameA
GetWindowThreadProcessId
PeekMessageA
DrawTextW
UnregisterClassA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
R
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ