Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
92ce87a67cadac1a5967561d6f623402_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
92ce87a67cadac1a5967561d6f623402_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
92ce87a67cadac1a5967561d6f623402_JaffaCakes118
Size
263KB
MD5
92ce87a67cadac1a5967561d6f623402
SHA1
2c26da55a333ed110b5e12ea55acf3eeec6f6850
SHA256
2938ec76c8b764875523d3bc670ed21e88f258c5915c7a6aa43db950f9412da2
SHA512
dfc172306cea69918846f80a873116a1c8e9caa931df74406611027059999e026a1c4c2e8a2b3e3b436470d446cf4b578cc1b115de391ccfc76b42561f8a3b87
SSDEEP
6144:sfQMMq3zUs0sBDoDQWebbEzHY5/AOJ2kGBme0DYd:sYOTDwbebbN9nOmDYd
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\rdm\projects\39454\out\Release\chrome_elf.dll.pdb
GetLastError
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
CreateRemoteThread
IsDebuggerPresent
SetLastError
WriteFile
CreateFileW
CloseHandle
GetCurrentDirectoryW
FormatMessageA
GetTickCount
WaitForSingleObject
GetCurrentThreadId
Sleep
RaiseException
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
GetModuleHandleExW
GetSystemTimeAsFileTime
QueryPerformanceCounter
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
DeleteCriticalSection
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
SetEvent
ReadFile
ReadConsoleW
SetFilePointerEx
FlushFileBuffers
FindClose
HeapAlloc
HeapReAlloc
HeapFree
ReadProcessMemory
WriteProcessMemory
VirtualProtectEx
GetStdHandle
GetFileType
SleepEx
TerminateProcess
HeapSize
WriteConsoleW
GetTimeZoneInformation
EnumSystemLocalesW
GetCommandLineW
GetVersionExW
GetCurrentProcess
GetProcAddress
GetProcessId
GetCurrentProcessId
GetModuleHandleW
VirtualProtect
GetCommandLineA
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetUserDefaultLCID
IsValidLocale
FreeLibrary
GetStringTypeW
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
RtlUnwind
InterlockedFlushSList
LoadLibraryExW
ExitProcess
GetConsoleCP
GetConsoleMode
SetStdHandle
GetProcessHeap
GetModuleFileNameA
GetACP
TraceEvent
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegCreateKeyExW
RegCloseKey
AddDllToBlacklist
ClearCrashKeyValueImpl
CrashForException
DumpProcessWithoutCrash
GetBlacklistIndex
GetHandleVerifier
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsBlacklistInitialized
SetCrashKeyValueImpl
SignalChromeElf
SuccessfullyBlocked
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ