Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
3bab4373debc0a276c63e84a59f3336d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3bab4373debc0a276c63e84a59f3336d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
3bab4373debc0a276c63e84a59f3336d_JaffaCakes118
Size
941KB
MD5
3bab4373debc0a276c63e84a59f3336d
SHA1
57102196ec5157f2f23b09912247067d887bafa1
SHA256
b2aeb4a39a5dacbf7987a1c2043110a5507ebd51e2553c29c2571a07ba5e1aa3
SHA512
fb00ade2040f0a657b0fc1b7f78892530388ae44507244255bbed3fa405021eb0a02fca8de5dfa16741628561a58012be2af047562a13b97f593bdbb28bf813d
SSDEEP
12288:ecpT211S3DZiIRfQeveiPVahR6tLxs1NwFileKxJVoofQaT83sI7w5e0kHIphTaZ:NFyIeJYq1kHchExvoVv+q0LN4IZ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
d:\Torch\57-prerelease\Client\src\out\release_static_x86_official\initialexe\torch.exe.pdb
GetInstallDetailsPayload
SignalChromeElf
SignalInitializeCrashReporting
ImpersonateNamedPipeClient
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
SystemFunction036
OpenProcessToken
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
GetTokenInformation
LookupPrivilegeValueW
CreateProcessAsUserW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
GetThreadContext
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetLastError
SetLastError
CreateEventW
GetCurrentThreadId
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetProcessId
SetCurrentDirectoryW
SetProcessShutdownParameters
LoadLibraryExW
VirtualAlloc
VirtualFree
MultiByteToWideChar
WideCharToMultiByte
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
WriteFile
CreateFileW
DeleteFileW
CloseHandle
GetLocalTime
GetCurrentDirectoryW
GetCurrentProcessId
FormatMessageA
GetTickCount
Sleep
FileTimeToSystemTime
QueryPerformanceFrequency
SystemTimeToTzSpecificLocalTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCommandLineW
LocalFree
GetModuleHandleW
ExpandEnvironmentStringsW
GetVersionExW
GetNativeSystemInfo
VerSetConditionMask
VerifyVersionInfoW
TerminateProcess
OpenProcess
GetExitCodeProcess
ReadFile
GetFileSizeEx
SetEndOfFile
GetFileInformationByHandle
SetFilePointerEx
FlushFileBuffers
GetSystemInfo
GetProcessTimes
VirtualQueryEx
GetThreadId
IsDebuggerPresent
RaiseException
CreateThread
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
CreateDirectoryW
QueryDosDeviceW
GetLongPathNameW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
UnmapViewOfFile
SetFileAttributesW
ReplaceFileW
GetTempFileNameW
GetThreadLocale
MapViewOfFile
MoveFileW
RegisterWaitForSingleObject
UnregisterWaitEx
GetUserDefaultLangID
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
HeapSetInformation
GetModuleHandleExW
FindFirstFileW
FindFirstFileExW
FindNextFileW
FindClose
SizeofResource
LockResource
LoadResource
FindResourceW
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
VirtualQuery
LoadLibraryW
SetEvent
ResetEvent
SetInformationJobObject
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
CompareStringW
DecodePointer
InitializeCriticalSectionAndSpinCount
CreateProcessW
GetSystemDirectoryW
GetWindowsDirectoryW
GetEnvironmentVariableW
SetEnvironmentVariableW
OutputDebugStringW
GetComputerNameExW
FreeLibrary
LockFileEx
UnlockFileEx
GetFileType
VirtualAllocEx
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateJobObject
GetUserDefaultLCID
WriteProcessMemory
AssignProcessToJobObject
SetHandleInformation
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualProtectEx
QueryFullProcessImageNameW
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
CreateRemoteThread
ReadProcessMemory
DebugBreak
lstrlenW
SearchPathW
VirtualProtect
LoadLibraryExA
SuspendThread
CreateSemaphoreW
ReleaseSemaphore
GetVersion
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GetFileInformationByHandleEx
DisconnectNamedPipe
ConnectNamedPipe
GetUserDefaultUILanguage
ResumeThread
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetACP
GetStdHandle
SetStdHandle
GetFullPathNameW
ExitProcess
GetConsoleMode
GetConsoleCP
PeekNamedPipe
GetDriveTypeW
RtlUnwind
GetCPInfo
GetLocaleInfoW
LCMapStringW
EncodePointer
GetStringTypeW
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetSystemDefaultLCID
CreateFileMappingW
DeleteCriticalSection
GetMappedFileNameW
SHGetFolderPathW
SHGetKnownFolderPath
CommandLineToArgvW
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
CloseDesktop
wsprintfW
GetWindowThreadProcessId
AllowSetForegroundWindow
IsWindow
SendMessageTimeoutW
FindWindowExW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
timeGetTime
WinHttpReadData
WinHttpCrackUrl
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpOpen
WinHttpConnect
WinHttpCloseHandle
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ