Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
a75f0e58af68d4b95b0d6f72117c4a9e_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a75f0e58af68d4b95b0d6f72117c4a9e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
a75f0e58af68d4b95b0d6f72117c4a9e_JaffaCakes118
Size
939KB
MD5
a75f0e58af68d4b95b0d6f72117c4a9e
SHA1
f57f0fd9df393fbafc83ba3d05e6be656a62c53b
SHA256
45d2dc27faa2377adb9ad80cef515fd7cee9c81a9769785e429b9165fd8aeacc
SHA512
b3a67bcfc6a6c489a1a715baf3cbc588b5a6851dd1fe6fe4ee9a4373bf8645c0bb86d3c6b91296988a6a9dc339d34a2d2b575d8cdbd0177cb8ec88e531f50dfd
SSDEEP
12288:sa++kVbDTs5N5IQtGGNjuHibl12hqoW4KFjibYGiSUBtHHlxByo3v:sa++ebDw5N53G2v2hqVFjtGinlxco/
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\sources\elementsbrowser_xp\out_release\Release\initialexe\elementsbrowser.exe.pdb
SignalChromeElf
UuidCreate
GetSecurityDescriptorSacl
GetUserNameW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
CreateProcessAsUserW
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
SystemFunction036
GetAce
GetKernelObjectSecurity
GetLengthSid
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
LookupPrivilegeValueW
SetThreadToken
SetEntriesInAclW
GetSecurityInfo
ImpersonateNamedPipeClient
WinHttpAddRequestHeaders
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpSetTimeouts
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
timeGetTime
CreateDesktopW
GetThreadDesktop
CloseWindowStation
CloseDesktop
CreateWindowStationW
SetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
SendMessageTimeoutW
IsWindow
FindWindowExW
CharUpperW
GetWindowThreadProcessId
AllowSetForegroundWindow
GetConsoleMode
ExitProcess
HeapAlloc
SetStdHandle
GetFullPathNameW
GetConsoleCP
GetProcessHeap
HeapFree
EncodePointer
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryExA
HeapReAlloc
GetDriveTypeW
GetACP
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
GetStartupInfoW
LCMapStringW
IsValidLocale
EnumSystemLocalesW
HeapSize
FreeEnvironmentStringsW
WriteConsoleW
IsValidCodePage
GetOEMCP
ReadConsoleW
FileTimeToLocalFileTime
PeekNamedPipe
OutputDebugStringW
SetEnvironmentVariableA
GetEnvironmentStringsW
GetComputerNameExW
GetSystemDefaultLCID
GetThreadLocale
GetTimeZoneInformation
IsProcessorFeaturePresent
CreateSemaphoreW
HeapSetInformation
GetModuleHandleA
GetProcAddress
GetLastError
SetLastError
CreateEventW
GetCurrentThreadId
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetProcessId
SetCurrentDirectoryW
SetProcessShutdownParameters
GetVersion
LoadLibraryExW
OpenProcess
GetCurrentProcessId
CreateRemoteThread
GetModuleHandleW
GetFileInformationByHandle
GetExitCodeProcess
CompareStringW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetModuleFileNameW
LoadResource
LockResource
SizeofResource
FindResourceW
SetErrorMode
GetSystemInfo
VirtualAlloc
VirtualFree
GetTickCount
FormatMessageA
WriteFile
CreateFileW
CloseHandle
DeleteFileW
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
GetCurrentThread
GetSystemTimeAsFileTime
Sleep
FileTimeToSystemTime
SetThreadPriority
GetThreadPriority
QueryPerformanceFrequency
GetCommandLineW
LocalFree
GetNativeSystemInfo
GetVersionExW
TerminateProcess
IsDebuggerPresent
GetEnvironmentVariableW
SetEnvironmentVariableW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
CreateThread
FreeLibrary
LoadLibraryW
GetUserDefaultLangID
ExpandEnvironmentStringsW
SetInformationJobObject
CreateProcessW
SetHandleInformation
AssignProcessToJobObject
ReadFile
GetStdHandle
CreatePipe
ResumeThread
GetProcessTimes
MoveFileExW
CreateDirectoryW
CopyFileW
GetFileAttributesW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
RemoveDirectoryW
QueryDosDeviceW
SetFileAttributesW
lstrlenW
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetFileSizeEx
GetLocaleInfoW
GetUserDefaultUILanguage
LeaveCriticalSection
EnterCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleHandleExW
FindFirstFileW
FindFirstFileExW
FindClose
FindNextFileW
RegisterWaitForSingleObject
UnregisterWaitEx
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetUnhandledExceptionFilter
SetEvent
ResetEvent
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
VirtualQueryEx
VirtualAllocEx
VirtualProtectEx
WriteProcessMemory
InitializeCriticalSection
TerminateJobObject
GetUserDefaultLCID
GetThreadContext
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
ReadProcessMemory
SuspendThread
DebugBreak
SearchPathW
LockFileEx
UnlockFileEx
SleepEx
ConnectNamedPipe
DisconnectNamedPipe
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
ReleaseSemaphore
WTSFreeMemory
WTSQuerySessionInformationW
ClearCrashKeyValueImpl
CrashForException
DumpProcessWithoutCrash
GetHandleVerifier
GetUploadedReportsImpl
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsSandboxedProcess
SetCrashKeyValueImpl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ