Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
351956d8e5106c081578a571fd356e0b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
351956d8e5106c081578a571fd356e0b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
351956d8e5106c081578a571fd356e0b_JaffaCakes118
Size
689KB
MD5
351956d8e5106c081578a571fd356e0b
SHA1
c7d57fc1e66e8c73b7e43aa897b4e5e3138dacff
SHA256
1cbf329b143a0932064dc1ade7da9657fa218779dc99b140be6a986e17a09e11
SHA512
257c2a04b75e02da96b555ef80b568b13c94e5fae217c6160f6a15b4489109584515c637051b2ead8a85f6775a7cf914a6cac25a789e4471ecd3e5470a6bfc5f
SSDEEP
12288:fBBgsstdSguLKXlRO++NvbrKLYWHdkqoQO+4zkS:5BgsstoguLYW++JbrxudB3O7kS
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\b\build\slave\chrome-official\build\src\build\Release\nacl64_exe.pdb
PathRemoveFileSpecW
PathFileExistsW
GetTickCount
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
SetInformationJobObject
WaitForSingleObject
SetLastError
GetLastError
InitializeCriticalSection
TerminateJobObject
SetEvent
GetQueuedCompletionStatus
ResetEvent
DuplicateHandle
GetCurrentThreadId
CreateThread
CreateEventW
CreateIoCompletionPort
DeleteCriticalSection
PostQueuedCompletionStatus
SignalObjectAndWait
SetHandleInformation
GetProcessHandleCount
VirtualFree
FreeLibrary
LoadLibraryW
WriteProcessMemory
MapViewOfFile
CreateFileMappingW
GetExitCodeProcess
GetThreadContext
AssignProcessToJobObject
UnregisterWaitEx
RegisterWaitForSingleObject
VirtualFreeEx
VirtualAllocEx
VirtualProtectEx
GetLongPathNameW
GetFileAttributesW
GetModuleHandleW
CreateFileW
QueryDosDeviceW
CreateJobObjectW
CreateMutexW
GetCurrentProcessId
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
lstrlenW
WideCharToMultiByte
VirtualQuery
ReadProcessMemory
GetCurrentDirectoryW
ReleaseMutex
SetFilePointer
WriteFile
OutputDebugStringA
FormatMessageA
ExpandEnvironmentStringsW
ReadFile
VirtualAlloc
SetEnvironmentVariableW
MultiByteToWideChar
GetUserDefaultLangID
GetNativeSystemInfo
GetVersionExW
GetUserDefaultUILanguage
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
FlushFileBuffers
RtlCaptureStackBackTrace
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
GetStdHandle
HeapSetInformation
ReleaseSemaphore
CreateSemaphoreW
WaitNamedPipeW
WaitForMultipleObjects
TransactNamedPipe
SetNamedPipeHandleState
SizeofResource
LockResource
LoadResource
FindResourceW
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
GetStartupInfoW
HeapFree
GetConsoleCP
GetConsoleMode
HeapAlloc
SetStdHandle
GetFileType
HeapReAlloc
GetCPInfo
RtlPcToFileHeader
LCMapStringA
LCMapStringW
GetModuleFileNameA
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapCreate
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LoadLibraryA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
QueueUserWorkItem
GetTempPathW
LocalFree
GetCommandLineW
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
ExitProcess
Sleep
GetModuleHandleA
GetProcAddress
SetCurrentDirectoryW
LoadLibraryExW
GetEnvironmentVariableW
GetModuleFileNameW
GetSystemDirectoryW
GetWindowsDirectoryW
RaiseException
CloseDesktop
CloseWindowStation
CreateWindowStationW
GetProcessWindowStation
CreateDesktopW
SetProcessWindowStation
GetThreadDesktop
GetUserObjectInformationW
MessageBoxW
CharUpperW
CommandLineToArgvW
SHGetFolderPathW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
timeGetTime
RegCloseKey
RegDisablePredefinedCache
RevertToSelf
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
OpenProcessToken
SetThreadToken
CreateProcessAsUserW
RegCreateKeyExW
CreateRestrictedToken
DuplicateTokenEx
DuplicateToken
EqualSid
GetTokenInformation
LookupPrivilegeValueW
RegOpenKeyExW
TraceEvent
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceLoggerHandle
GetTraceEnableFlags
GetTraceEnableLevel
ConvertSidToStringSidW
RegSetValueExW
RegDeleteValueW
RegEnumKeyExW
RegQueryValueExW
RegQueryInfoKeyW
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
CrashForException
DumpProcess
SetActiveURL
SetClientId
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ