Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
418aaca91653730c2fe0068276d0b387_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
418aaca91653730c2fe0068276d0b387_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
418aaca91653730c2fe0068276d0b387_JaffaCakes118
Size
1.4MB
MD5
418aaca91653730c2fe0068276d0b387
SHA1
bd87c113c806001ce3b1577ce6cecf542556e9b4
SHA256
a3cbc5001e52744730d4de5cecd792e15b404847e3f826373e55aa064d04a7cc
SHA512
1f0c6e43cca8d112cac2550bea1fcf812528b85e94478cc10a38366ae2a9dbc903e2ebdb836086d460ee10e4a1c39138e14330b895ba4c1bbbe96b8e95cbc28d
SSDEEP
24576:LUNI4sv10Y0DIU83ok4jfg3fEr5+aKbFUTWh5UX1k50Dc:LUNI4MsD7cok40ErUaKuTWh+lk50Dc
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\b\build\slave\chrome-official\build\src\build\Release\setup.pdb
GetThreadLocale
ExpandEnvironmentStringsW
ResumeThread
WriteProcessMemory
GetFileInformationByHandle
VirtualAllocEx
QueueUserAPC
TerminateProcess
GetModuleHandleW
CreateProcessW
OpenProcess
WaitForSingleObject
CloseHandle
GetModuleFileNameW
GetCurrentProcess
GetProcAddress
LoadLibraryW
FreeLibrary
GetUserDefaultUILanguage
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
LocalFree
CreateMutexW
ReleaseMutex
GetSystemTimeAsFileTime
GetSystemDirectoryW
VirtualQuery
SetUnhandledExceptionFilter
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
LeaveCriticalSection
CreateFileW
ReleaseSemaphore
EnterCriticalSection
CreateSemaphoreW
DeleteCriticalSection
GetCurrentThreadId
GetCurrentProcessId
CreateThread
SetEvent
WaitNamedPipeW
WriteFile
TransactNamedPipe
ResetEvent
SetNamedPipeHandleState
WaitForMultipleObjects
GetCommandLineW
SetFilePointer
GetTickCount
FormatMessageA
SetLastError
GetModuleHandleA
OutputDebugStringA
DeleteFileW
GetTempFileNameW
GetFileSize
FindFirstFileW
LoadLibraryExW
MoveFileExW
CreateDirectoryW
VirtualFree
CopyFileW
GetFileAttributesW
FileTimeToSystemTime
ReadFile
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
VirtualAlloc
FindClose
RemoveDirectoryW
FindNextFileW
GetFileTime
GetFileAttributesExW
FileTimeToLocalFileTime
GetNativeSystemInfo
InterlockedCompareExchange
GetVersionExW
GetUserDefaultLangID
GetExitCodeProcess
GetStdHandle
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
DuplicateHandle
QueryPerformanceCounter
SetEndOfFile
SetFilePointerEx
SetFileTime
FlushFileBuffers
GetEnvironmentVariableW
SetEnvironmentVariableW
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
GetWindowsDirectoryW
RtlCaptureStackBackTrace
InterlockedExchangeAdd
Sleep
RaiseException
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
GetDateFormatW
GetShortPathNameW
FindResourceW
LoadResource
SizeofResource
LockResource
WTSGetActiveConsoleSessionId
WideCharToMultiByte
InterlockedExchange
MultiByteToWideChar
UnhandledExceptionFilter
HeapFree
GetStartupInfoW
PeekNamedPipe
GetFileType
HeapAlloc
ExitProcess
GetConsoleCP
GetConsoleMode
GetProcessHeap
SetStdHandle
HeapReAlloc
GetCPInfo
RtlUnwind
LCMapStringA
LCMapStringW
GetModuleFileNameA
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
CreateFileA
GetACP
GetOEMCP
IsValidCodePage
HeapSize
LoadLibraryA
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLastError
SendMessageW
DestroyWindow
SetForegroundWindow
MonitorFromWindow
GetWindowThreadProcessId
GetMonitorInfoW
MoveWindow
UnhookWindowsHookEx
SendMessageTimeoutW
FindWindowW
CharUpperW
MessageBoxW
SetWindowsHookExW
SetWindowLongW
GetWindowLongW
LoadIconW
IsWindow
FindWindowExW
CreateWindowExW
CallNextHookEx
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertSidToStringSidW
GetTokenInformation
LookupAccountSidW
InitializeSecurityDescriptor
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTraceLoggerHandle
GetTraceEnableFlags
GetSidSubAuthority
ConvertSecurityDescriptorToStringSecurityDescriptorW
SetFileSecurityW
GetFileSecurityW
GetUserNameW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
CreateProcessAsUserW
GetSidSubAuthorityCount
CommandLineToArgvW
SHChangeNotify
SHGetFolderPathW
ShellExecuteExW
ord59
ord680
SHFileOperationW
CoInitializeEx
PropVariantClear
CoSetProxyBlanket
StringFromGUID2
CoCreateInstance
CoUninitialize
DestroyEnvironmentBlock
CreateEnvironmentBlock
CreateURLMonikerEx
WTSQueryUserToken
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ntohl
timeGetTime
SHDeleteEmptyKeyW
UrlCanonicalizeW
SHDeleteKeyW
SHStrDupW
SHCopyKeyW
VariantClear
VariantInit
SysAllocString
SysFreeString
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ