Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3f9b091c227c556b625a112ae350e18b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f9b091c227c556b625a112ae350e18b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
3f9b091c227c556b625a112ae350e18b_JaffaCakes118
Size
603KB
MD5
3f9b091c227c556b625a112ae350e18b
SHA1
278bf15088f52aa172d388a7e42ed945126c547f
SHA256
317d12da8444f3bd33fdad54b20cf25b2ccc7826e8f6ee03d28f4831beac3045
SHA512
b070e399c42f03b9e72bc1d40557ed2feda540dd27ea7fa2a287d4fac87fe3929f046a93388a96053aa6f0e927646c5f216e3cf0b058eb873d7ede17a35d5f4d
SSDEEP
12288:XBBgCTA67JKsMc2RnhytP7rqL5KwMTzpo8Z:RBgCTA8JKsdchyJ7rQxMT17Z
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\b\build\slave\chrome-official\build\src\build\Release\nacl64_exe.pdb
PathRemoveFileSpecW
PathFileExistsW
GetTickCount
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
SetInformationJobObject
WaitForSingleObject
SetLastError
GetLastError
InitializeCriticalSection
TerminateJobObject
SetEvent
GetQueuedCompletionStatus
ResetEvent
DuplicateHandle
GetCurrentThreadId
CreateThread
CreateEventW
CreateIoCompletionPort
DeleteCriticalSection
PostQueuedCompletionStatus
SignalObjectAndWait
SetHandleInformation
GetProcessHandleCount
VirtualFree
FreeLibrary
LoadLibraryW
WriteProcessMemory
MapViewOfFile
CreateFileMappingW
GetExitCodeProcess
GetThreadContext
AssignProcessToJobObject
UnregisterWaitEx
RegisterWaitForSingleObject
VirtualFreeEx
VirtualAllocEx
VirtualProtectEx
GetLongPathNameW
GetFileAttributesW
GetModuleHandleW
CreateFileW
QueryDosDeviceW
CreateJobObjectW
CreateMutexW
GetCurrentProcessId
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
lstrlenW
WideCharToMultiByte
VirtualQuery
ReadProcessMemory
GetCurrentDirectoryW
ReleaseMutex
SetFilePointer
WriteFile
OutputDebugStringA
FormatMessageA
ExpandEnvironmentStringsW
ReadFile
VirtualAlloc
SetEnvironmentVariableW
MultiByteToWideChar
GetUserDefaultLangID
GetNativeSystemInfo
GetVersionExW
GetUserDefaultUILanguage
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
FlushFileBuffers
RtlCaptureStackBackTrace
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
GetStdHandle
HeapSetInformation
ReleaseSemaphore
CreateSemaphoreW
WaitNamedPipeW
WaitForMultipleObjects
TransactNamedPipe
SetNamedPipeHandleState
SizeofResource
LockResource
LoadResource
FindResourceW
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
GetStartupInfoW
HeapFree
GetConsoleCP
GetConsoleMode
HeapAlloc
SetStdHandle
GetFileType
HeapReAlloc
GetCPInfo
RtlPcToFileHeader
LCMapStringA
LCMapStringW
GetModuleFileNameA
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapCreate
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LoadLibraryA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
QueueUserWorkItem
GetTempPathW
LocalFree
GetCommandLineW
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
ExitProcess
Sleep
GetModuleHandleA
GetProcAddress
SetCurrentDirectoryW
LoadLibraryExW
GetEnvironmentVariableW
GetModuleFileNameW
GetSystemDirectoryW
GetWindowsDirectoryW
RaiseException
CloseDesktop
CloseWindowStation
CreateWindowStationW
GetProcessWindowStation
CreateDesktopW
SetProcessWindowStation
GetThreadDesktop
GetUserObjectInformationW
MessageBoxW
CharUpperW
CommandLineToArgvW
SHGetFolderPathW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
timeGetTime
RegCloseKey
RegDisablePredefinedCache
RevertToSelf
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
OpenProcessToken
SetThreadToken
CreateProcessAsUserW
RegCreateKeyExW
CreateRestrictedToken
DuplicateTokenEx
DuplicateToken
EqualSid
GetTokenInformation
LookupPrivilegeValueW
RegOpenKeyExW
TraceEvent
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceLoggerHandle
GetTraceEnableFlags
GetTraceEnableLevel
ConvertSidToStringSidW
RegSetValueExW
RegDeleteValueW
RegEnumKeyExW
RegQueryValueExW
RegQueryInfoKeyW
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
CrashForException
DumpProcess
SetActiveURL
SetClientId
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ