Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
60705266b6a77da87fb389e0707f3931_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
60705266b6a77da87fb389e0707f3931_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
60705266b6a77da87fb389e0707f3931_JaffaCakes118
Size
1.3MB
MD5
60705266b6a77da87fb389e0707f3931
SHA1
c32198d1ee3c5079ec87d3ad895a35d962a5ccca
SHA256
b7a8eb94b10be84cc563b2d2b38bc5e8f2b0f23d2dd749caf9c33eedb89573fa
SHA512
b52326e11044142d479a67e1d49815ebe7800d72871acc6396d8d6a6899b0cbabec2fb3954dacba427f9a42fa09416834dfb992bc87e68175bbd8f84b0b615fa
SSDEEP
24576:TIyebVG5nrzwKmQ8xZYqp891NDSGbXRx27g4WYKEA:QqfzmSqp89HDdOg4yEA
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
D:\rdm\projects\57294\chrome\src\out\Release_x86\initialexe\QQBrowser.exe.pdb
GetInstallDetailsPayload
SignalChromeElf
SignalInitializeCrashReporting
GetSecurityInfo
SetEntriesInAclW
SetThreadToken
RegisterTraceGuidsW
UnregisterTraceGuids
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
TraceEvent
ConvertSidToStringSidW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
GetTokenInformation
RegDeleteValueW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegQueryInfoKeyW
CreateProcessAsUserW
SystemFunction036
EventUnregister
EventRegister
EventWrite
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
LookupPrivilegeValueW
GetThreadId
IsDebuggerPresent
GetCurrentProcess
TerminateProcess
GetVersionExW
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetLastError
SetLastError
CreateEventW
WaitForMultipleObjects
GetCurrentThreadId
DuplicateHandle
WaitForSingleObject
GetProcessId
SetCurrentDirectoryW
FindClose
FindFirstFileW
InitializeCriticalSectionAndSpinCount
FreeLibrary
LoadLibraryExW
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
MultiByteToWideChar
WideCharToMultiByte
CreateFileW
ReadFile
CloseHandle
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateDirectoryW
WriteFile
GetTempPathW
DecodePointer
RaiseException
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
DeleteCriticalSection
GetModuleHandleExW
GetTickCount
LoadResource
LockResource
SizeofResource
FindResourceW
ResumeThread
CreateProcessW
VirtualAllocEx
VirtualProtectEx
VirtualQueryEx
ReadProcessMemory
WriteProcessMemory
GetCurrentThread
SuspendThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualProtect
VirtualQuery
ReleaseSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
Sleep
SetEvent
SetFilePointerEx
lstrlenW
GetSystemInfo
ExpandEnvironmentStringsW
GetSystemDirectoryW
GetProcessTimes
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlCaptureContext
SetUnhandledExceptionFilter
OpenThread
InitializeCriticalSection
HeapCreate
GetLocalTime
GetCurrentDirectoryW
FormatMessageA
SetThreadPriority
QueryThreadCycleTime
QueryPerformanceFrequency
GetThreadPriority
QueryPerformanceCounter
GetCommandLineW
GetModuleHandleA
FindFirstFileExW
FindNextFileW
GetFileAttributesW
FlushFileBuffers
GetUserDefaultLangID
AcquireSRWLockExclusive
QueryDosDeviceW
GetLongPathNameW
GetNativeSystemInfo
RtlUnwind
CreateThread
GetWindowsDirectoryW
RegisterWaitForSingleObject
UnregisterWaitEx
TlsGetValue
SetEnvironmentVariableW
GetEnvironmentVariableW
RtlCaptureStackBackTrace
TlsSetValue
TlsAlloc
TlsFree
HeapSetInformation
WakeAllConditionVariable
WakeConditionVariable
SleepConditionVariableSRW
ResetEvent
SetInformationJobObject
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
OutputDebugStringW
TerminateJobObject
GetUserDefaultLCID
AssignProcessToJobObject
GetFileType
SetHandleInformation
ProcessIdToSessionId
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
CreateMutexW
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
CreateRemoteThread
DebugBreak
SearchPathW
LoadLibraryExA
GetCPInfo
GetLocaleInfoW
LCMapStringW
EncodePointer
GetStringTypeW
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
GetDriveTypeW
GetConsoleCP
GetConsoleMode
GetFullPathNameW
SetStdHandle
GetStdHandle
GetACP
ReadConsoleW
IsValidLocale
EnumSystemLocalesW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
ExitProcess
QueryWorkingSetEx
GetMappedFileNameW
SHGetSpecialFolderPathW
CommandLineToArgvW
SHGetKnownFolderPath
SHGetFolderPathW
PathFileExistsW
PathRemoveFileSpecW
PathFindFileNameW
PathMatchSpecW
PathCombineW
SetProcessDPIAware
PostMessageW
KillTimer
SetWindowLongW
SetProcessWindowStation
CreateWindowExW
RegisterClassExW
UnregisterClassW
PostQuitMessage
TranslateMessage
GetQueueStatus
MsgWaitForMultipleObjectsEx
PeekMessageW
GetUserObjectInformationW
GetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
DestroyWindow
CloseDesktop
GetWindowLongW
DefWindowProcW
DispatchMessageW
SetTimer
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
timeEndPeriod
timeGetTime
timeBeginPeriod
GetHandleVerifier
GetProcessScope
IsOurCrashExit
IsSandboxedProcess
QBRtLoggerRW
SetCustomInfo
SetUnexpectedExit
ZombieReport
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ