Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
14e364e8b712f592caf4dc5a86de9959_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14e364e8b712f592caf4dc5a86de9959_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
14e364e8b712f592caf4dc5a86de9959_JaffaCakes118
Size
450KB
MD5
14e364e8b712f592caf4dc5a86de9959
SHA1
1a672530f7911cddda5497297fc07d0ba0a560bc
SHA256
7dd30971bf762be0b90177aedabeacb061da01e57f7ce9f519096a7dd8f4edd2
SHA512
2d6491309bb55fe0655602baa0331bfa44d4452cbeb206be849359113c4c8b8fc4dd9b14d79cbc6c56ff5cd36868ce2dd8c1d554eefa26afac10d083673a187c
SSDEEP
6144:MYG40VACNQnBanEFweSPUNIdDZdR0OrLW9RjCDLEebip2bQBm/wVd/gdu9N8GCRB:MY+3oniCkqC6S
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
AccessibleObjectFromWindow
AccessibleChildren
ord219
GetLocaleInfoA
LocalFree
LocalSize
LocalAlloc
lstrlenW
lstrcmpiW
lstrcpynW
FreeLibrary
GetProcAddress
LoadLibraryW
IsBadStringPtrW
lstrcatA
lstrcatW
VerLanguageNameW
CreateThread
CloseHandle
GetModuleHandleA
__C_specific_handler
GetCurrentProcessId
GetModuleFileNameW
GetModuleHandleW
lstrcpyW
lstrcmpW
GetCommandLineW
GetSystemDirectoryW
MapViewOfFile
GetLastError
CreateFileMappingA
SetLastError
LoadLibraryA
UnmapViewOfFile
MultiByteToWideChar
WideCharToMultiByte
GetVersionExA
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualQuery
GetSystemInfo
VirtualFree
Sleep
ResumeThread
GetThreadContext
SuspendThread
SetThreadPriority
GetThreadPriority
GetCurrentThreadId
FlushInstructionCache
VirtualProtectEx
GetCurrentProcess
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
HeapReAlloc
SetFilePointer
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
HeapDestroy
HeapCreate
HeapSetInformation
GetStartupInfoA
GetFileType
GetStdHandle
InitializeCriticalSection
SetHandleCount
DeleteCriticalSection
FlushFileBuffers
CreateFileA
GetConsoleMode
GetConsoleCP
WriteFile
ExitProcess
HeapSize
RtlLookupFunctionEntry
RtlUnwindEx
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlCaptureContext
RaiseException
RtlPcToFileHeader
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
FlsSetValue
GetCommandLineA
GetProcessHeap
FlsGetValue
TlsFree
FlsFree
TlsSetValue
FlsAlloc
RtlVirtualUnwind
PostMessageA
IsWindow
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
GetAncestor
MessageBoxW
GetClassNameW
GetWindowTextW
GetWindowRect
UnhookWindowsHookEx
wsprintfW
IsWindowVisible
GetWindowLongA
GetParent
CallNextHookEx
SetTimer
KillTimer
SendMessageA
RegisterWindowMessageA
RegisterWindowMessageW
SendMessageTimeoutA
CharLowerW
SetWindowsHookExA
FindWindowExW
SendMessageW
GetWindowTextA
GetSecurityDescriptorSacl
DragQueryFileW
SHGetDesktopFolder
SHGetSpecialFolderLocation
CoTaskMemFree
CoCreateInstance
SysFreeString
VariantInit
UuidCreate
F0
F1
F136756858467894783FFF
F13737625645735673567245624
F1435346457235257656724563457
F15675632473
F165795458356867892
F2
F3
F5
IO_A
IO_AAA
IO_DDD
IO_FFF
IO_GGG
IO_L
IO_TTT
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ