Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8ab3928dff22d51ae4e88196d7e7782d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8ab3928dff22d51ae4e88196d7e7782d_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
8ab3928dff22d51ae4e88196d7e7782d_JaffaCakes118
Size
6.6MB
MD5
8ab3928dff22d51ae4e88196d7e7782d
SHA1
e5d0800acfeeeda596d8222a2bffeef164ac27aa
SHA256
9ce60d7bfd2195ee0cb527ce3b750201578dfa4f776ec04d55632318d5c14284
SHA512
cb1f17acfb6126d920e20150cd42d6742e107c113e218929781386ec27d281f8c5edd3e78854dc8469ea3d7811baf3aaced08013bb62f9bfe12b5c140d86d2e8
SSDEEP
98304:lJtD4lSgSUVNagtUQm9V/RX0+JoRcOW0PtKG8cm:nBCSkVEgtFmvRE+WRcOWR
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\Torch\60-prerelease\Client\src\out\release_static_x86_official\nacl_win64\nacl64.exe.pdb
OpenProcessToken
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
SystemFunction036
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
LookupPrivilegeValueW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
GetCharABCWidthsW
AddFontMemResourceEx
GetFontUnicodeRanges
SelectObject
CreateDIBSection
CreateCompatibleDC
EnumFontFamiliesExW
SetGraphicsMode
GetTextFaceW
GdiFlush
SetWorldTransform
ExtTextOutW
SetTextAlign
GetOutlineTextMetricsW
CreateFontIndirectW
RemoveFontMemResourceEx
DeleteObject
GetGlyphOutlineW
GetGlyphIndicesW
GetTextExtentPointI
SetBkMode
GetFontData
SetTextColor
DeleteDC
GetTextMetricsW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCommandLineA
TransactNamedPipe
DuplicateHandle
GetCurrentProcess
GetLongPathNameW
CloseHandle
GetLastError
ResumeThread
IsProcessInJob
QueryInformationJobObject
GetModuleFileNameW
GetModuleHandleW
DebugActiveProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
CreateNamedPipeW
WaitNamedPipeW
LocalFree
ConnectNamedPipe
GetModuleHandleA
FormatMessageW
VirtualFree
UnmapViewOfFile
GetSystemInfo
VirtualAlloc
VirtualProtect
CreateEventW
ContinueDebugEvent
WaitForDebugEvent
SetEvent
TerminateProcess
SuspendThread
GetThreadContext
SetThreadContext
VirtualQueryEx
ReadProcessMemory
WriteProcessMemory
ReadFile
WriteFile
SetHandleInformation
OpenProcess
GetCurrentThread
GetProcAddress
SetThreadPriority
VirtualQuery
ExitProcess
HeapCreate
HeapDestroy
GetCommandLineW
SetLastError
GetProcessId
QueryThreadCycleTime
Sleep
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
QueryPerformanceFrequency
GetThreadPriority
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
WaitForSingleObject
RaiseException
CreateThread
GetThreadId
IsDebuggerPresent
DeleteFileW
GetLocalTime
GetCurrentDirectoryW
FormatMessageA
GetTickCount
SetInformationJobObject
GetStdHandle
AssignProcessToJobObject
AttachConsole
CreateProcessW
AllocConsole
GlobalMemoryStatusEx
GetVersionExW
GetNativeSystemInfo
VerSetConditionMask
VerifyVersionInfoW
HeapSetInformation
WaitForMultipleObjects
ResetEvent
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
CreateFileMappingW
MapViewOfFile
GetFileSizeEx
SetFileTime
SetEndOfFile
GetFileInformationByHandle
SetFilePointerEx
FlushFileBuffers
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
SleepConditionVariableSRW
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
GetModuleHandleExW
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
LoadLibraryW
GetProcessTimes
CreateDirectoryW
QueryDosDeviceW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
SetFileAttributesW
GetFileAttributesExW
MoveFileExW
GetSystemDirectoryW
GetWindowsDirectoryW
GetUserDefaultLangID
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
GetSystemPowerStatus
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
FindFirstFileW
FindFirstFileExW
FindNextFileW
FindClose
RegisterWaitForSingleObject
UnregisterWaitEx
ReleaseSRWLockShared
AcquireSRWLockShared
GetModuleHandleExA
GetEnvironmentVariableW
SetEnvironmentVariableW
OutputDebugStringW
MultiByteToWideChar
WideCharToMultiByte
GetComputerNameExW
FreeLibrary
RtlAddFunctionTable
RtlDeleteFunctionTable
CreateRemoteThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
InitOnceExecuteOnce
RtlVirtualUnwind
CancelIo
InitializeCriticalSection
GetTimeZoneInformation
CreateFileA
DeleteCriticalSection
TerminateJobObject
GetUserDefaultLCID
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
CreateMutexW
VirtualProtectEx
QueryFullProcessImageNameW
VirtualAllocEx
VirtualFreeEx
CreateJobObjectW
DebugBreak
lstrlenW
SearchPathW
FlushInstructionCache
LockFileEx
UnlockFileEx
MapViewOfFileEx
SwitchToThread
GetThreadTimes
GetSystemTime
DisconnectNamedPipe
SetNamedPipeHandleState
PeekNamedPipe
GetNamedPipeHandleStateW
ReleaseSemaphore
CreateSemaphoreW
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
FreeLibraryAndExitThread
ExitThread
GetCurrentDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableA
GetACP
GetFullPathNameA
GetFullPathNameW
GetConsoleMode
GetConsoleCP
SetStdHandle
GetDriveTypeW
LoadLibraryExW
RtlPcToFileHeader
RtlUnwindEx
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
DecodePointer
EncodePointer
GetStringTypeW
CoUninitialize
CoTaskMemFree
CoCreateGuid
CoInitializeEx
GetMappedFileNameW
SHGetFolderPathW
SHGetKnownFolderPath
CommandLineToArgvW
SystemParametersInfoW
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
GetSystemMetrics
wsprintfW
MessageBoxW
PostQuitMessage
KillTimer
TranslateMessage
GetQueueStatus
MsgWaitForMultipleObjectsEx
PeekMessageW
SetTimer
DispatchMessageW
PostMessageW
RegisterClassExW
UnregisterClassW
CreateWindowExW
DestroyWindow
DefWindowProcW
GetWindowLongPtrW
SetWindowLongPtrW
CloseDesktop
CloseWindowStation
ScriptItemize
ScriptFreeCache
ScriptShape
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
timeEndPeriod
timeGetDevCaps
timeGetTime
timeBeginPeriod
ntohs
listen
htons
htonl
getsockname
closesocket
bind
accept
recv
select
send
setsockopt
shutdown
socket
WSAStartup
WSAEventSelect
WSACreateEvent
WSACleanup
WSACloseEvent
WSAGetLastError
gethostbyname
CreateEnvironmentBlock
DestroyEnvironmentBlock
GetProfileType
ClearBreakpadPipeEnvironmentVariable
ClearCrashKeyValueImpl
CrashForException
DumpProcess
DumpProcessWithoutCrash
GetHandleVerifier
InjectDumpForHangDebugging
InjectDumpForHungInput
InjectDumpForHungInputNoCrashKeys
InjectDumpProcessWithoutCrash
IsSandboxedProcess
RegisterNonABICompliantCodeRange
SetCrashKeyValueImpl
TerminateProcessWithoutDump
UnregisterNonABICompliantCodeRange
_ovly_debug_event
nacl_global_xlate_base
nacl_thread_ids
nacl_user
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ