Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
63ffad4856e9fde5cd0f9444d3030b2d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63ffad4856e9fde5cd0f9444d3030b2d_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
63ffad4856e9fde5cd0f9444d3030b2d_JaffaCakes118
Size
933KB
MD5
63ffad4856e9fde5cd0f9444d3030b2d
SHA1
de54ea3304e441bc531f2e4912e2a20f387e5101
SHA256
66912198520aa800ea8c39eac4047a5568225efd2ad6191c466ecc7925d9a695
SHA512
6b2240ac83020217d953e026b000e36d42b7202a1cb08627c9197161cfb5073ab78770d099791a9cf8995fe2826130083aa45b321dd140a63fea27c49f31504f
SSDEEP
12288:C8LgCc1kRcZqp8pitFjnXKaNYWzKG0jH1AB0WjkgywzkEBH:C8LgORiCDXK2rOjHxrgVzbBH
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Z:\sources\elementsbrowser_xp\out_release\Release\initialexe\elementsbrowser.exe.pdb
SignalChromeElf
UuidCreate
GetSecurityDescriptorSacl
GetUserNameW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
CreateProcessAsUserW
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
SystemFunction036
GetAce
GetKernelObjectSecurity
GetLengthSid
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
LookupPrivilegeValueW
SetThreadToken
SetEntriesInAclW
GetSecurityInfo
ImpersonateNamedPipeClient
WinHttpAddRequestHeaders
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpSetTimeouts
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
timeGetTime
CreateDesktopW
GetThreadDesktop
CloseWindowStation
CloseDesktop
CreateWindowStationW
SetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
SendMessageTimeoutW
IsWindow
FindWindowExW
CharUpperW
GetWindowThreadProcessId
AllowSetForegroundWindow
GetConsoleMode
ExitProcess
SetStdHandle
GetFullPathNameW
HeapReAlloc
GetConsoleCP
GetProcessHeap
HeapFree
EncodePointer
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryExA
HeapAlloc
GetDriveTypeW
GetACP
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
GetStartupInfoW
LCMapStringW
IsValidLocale
EnumSystemLocalesW
HeapSize
FreeEnvironmentStringsW
WriteConsoleW
IsValidCodePage
GetOEMCP
ReadConsoleW
FileTimeToLocalFileTime
PeekNamedPipe
OutputDebugStringW
SetEnvironmentVariableA
GetEnvironmentStringsW
GetComputerNameExW
GetSystemDefaultLCID
GetThreadLocale
GetTimeZoneInformation
IsProcessorFeaturePresent
CreateSemaphoreW
HeapSetInformation
GetModuleHandleA
GetProcAddress
GetLastError
SetLastError
CreateEventW
GetCurrentThreadId
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetProcessId
SetCurrentDirectoryW
SetProcessShutdownParameters
LoadLibraryExW
OpenProcess
GetCurrentProcessId
CreateRemoteThread
GetModuleHandleW
GetFileInformationByHandle
GetExitCodeProcess
CompareStringW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetModuleFileNameW
LoadResource
LockResource
SizeofResource
FindResourceW
SetErrorMode
GetSystemInfo
VirtualAlloc
VirtualFree
GetTickCount
FormatMessageA
WriteFile
CreateFileW
CloseHandle
DeleteFileW
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
GetCurrentThread
GetSystemTimeAsFileTime
Sleep
FileTimeToSystemTime
SetThreadPriority
GetThreadPriority
QueryPerformanceFrequency
GetCommandLineW
LocalFree
GetNativeSystemInfo
GetVersionExW
TerminateProcess
IsDebuggerPresent
GetEnvironmentVariableW
SetEnvironmentVariableW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
CreateThread
GetUserDefaultLangID
ExpandEnvironmentStringsW
SetInformationJobObject
CreateProcessW
SetHandleInformation
AssignProcessToJobObject
ReadFile
GetStdHandle
CreatePipe
ResumeThread
GetProcessTimes
CreateDirectoryW
GetFileAttributesW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
QueryDosDeviceW
lstrlenW
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetFileSizeEx
GetLocaleInfoW
GetUserDefaultUILanguage
LeaveCriticalSection
EnterCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleHandleExW
RegisterWaitForSingleObject
UnregisterWaitEx
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
LoadLibraryW
FindFirstFileExW
FindClose
FreeLibrary
SetUnhandledExceptionFilter
SetEvent
ResetEvent
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
VirtualQueryEx
VirtualAllocEx
VirtualProtectEx
WriteProcessMemory
InitializeCriticalSection
TerminateJobObject
GetUserDefaultLCID
GetThreadContext
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
ReadProcessMemory
SuspendThread
DebugBreak
SearchPathW
LockFileEx
UnlockFileEx
SleepEx
ConnectNamedPipe
DisconnectNamedPipe
GetVersion
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
ReleaseSemaphore
WTSFreeMemory
WTSQuerySessionInformationW
ClearCrashKeyValueImpl
CrashForException
DumpProcessWithoutCrash
GetHandleVerifier
GetUploadedReportsImpl
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsSandboxedProcess
SetCrashKeyValueImpl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ