Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
ac0295bd221268697df9deac04dae9fc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ac0295bd221268697df9deac04dae9fc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
ac0295bd221268697df9deac04dae9fc_JaffaCakes118
Size
1.1MB
MD5
ac0295bd221268697df9deac04dae9fc
SHA1
e130c3ef93be46efc53aeb3f003f17512fae370d
SHA256
d8e4f959e77cf9900ef15669f4802dd4291f1ffb3aa96f7d1b8a5c9ecd7d9f67
SHA512
218df7ee8dcc4bd3d8bbc3e67e54948e60119e5e238838a84e9cd4fdf3bd3e31d13f5ede25b1172a4b2ef7378fc7b04783f7a693874df07e5488264f18376d58
SSDEEP
24576:rKIc77QyzaGrwk4kUvyE6yr4HB9x4ddKPIO03hywIZ8:uIny2Grwk4ME6yr47xIdKPz03hywl
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\b\build\slave\chrome-official\build\src\build\Release\chrome_exe.pdb
PathFileExistsW
PathRemoveFileSpecW
SetInformationJobObject
GetQueuedCompletionStatus
WaitForSingleObject
SetEvent
InitializeCriticalSection
LeaveCriticalSection
GetLastError
SetLastError
EnterCriticalSection
ResetEvent
CreateEventW
PostQueuedCompletionStatus
CreateIoCompletionPort
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
TerminateJobObject
CreateThread
SetHandleInformation
VirtualFree
GetProcessHandleCount
ResumeThread
SignalObjectAndWait
InterlockedExchange
InterlockedIncrement
InterlockedDecrement
GetThreadContext
MapViewOfFile
FreeLibrary
LoadLibraryW
AssignProcessToJobObject
GetExitCodeProcess
CreateFileMappingW
WriteProcessMemory
RegisterWaitForSingleObject
UnregisterWaitEx
VirtualFreeEx
VirtualAllocEx
GetFileAttributesW
CreateFileW
GetLongPathNameW
VirtualProtectEx
QueryDosDeviceW
CreateJobObjectW
GetCurrentProcessId
CreateNamedPipeW
OpenEventW
SearchPathW
CreateMutexW
GetCurrentDirectoryW
lstrlenW
DebugBreak
VirtualQuery
WideCharToMultiByte
ReadProcessMemory
SuspendThread
ReleaseSemaphore
CreateSemaphoreW
WaitNamedPipeW
WriteFile
TransactNamedPipe
SetNamedPipeHandleState
WaitForMultipleObjects
SetEnvironmentVariableW
ExpandEnvironmentStringsW
UnmapViewOfFile
ReadFile
VirtualAlloc
GetFileTime
TerminateProcess
SetFilePointer
FormatMessageA
ReleaseMutex
MultiByteToWideChar
GetUserDefaultLangID
GetNativeSystemInfo
GetVersionExW
RaiseException
IsDebuggerPresent
InterlockedExchangeAdd
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
GetStdHandle
RtlCaptureStackBackTrace
SetEndOfFile
FlushFileBuffers
FindResourceW
LoadResource
SizeofResource
LockResource
WTSGetActiveConsoleSessionId
UnhandledExceptionFilter
GetStartupInfoW
HeapFree
GetConsoleCP
GetConsoleMode
SetStdHandle
GetFileType
HeapReAlloc
HeapAlloc
GetProcessHeap
GetCPInfo
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapCreate
HeapSize
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetTickCount
GetModuleHandleW
GetCurrentProcess
GetUserDefaultUILanguage
GetSystemDirectoryW
GetWindowsDirectoryW
LocalAlloc
GetThreadLocale
LocalFree
CloseHandle
QueueUserWorkItem
GetTempPathW
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
CreateProcessW
GetCommandLineW
ExitProcess
GetModuleHandleA
SetCurrentDirectoryW
GetProcAddress
GetModuleFileNameW
LoadLibraryExW
GetEnvironmentVariableW
CloseWindowStation
CloseDesktop
GetUserObjectInformationW
GetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
MessageBoxW
CharUpperW
CommandLineToArgvW
SHGetFolderPathW
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSQueryUserToken
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
timeGetTime
SetSecurityDescriptorDacl
RegCloseKey
RegOpenKeyExW
RevertToSelf
RegDisablePredefinedCache
SetThreadToken
CreateProcessAsUserW
SetTokenInformation
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorSacl
GetLengthSid
RegCreateKeyExW
CopySid
CreateWellKnownSid
GetTokenInformation
CreateRestrictedToken
InitializeSecurityDescriptor
EqualSid
DuplicateToken
LookupPrivilegeValueW
DuplicateTokenEx
GetSecurityInfo
ConvertSecurityDescriptorToStringSecurityDescriptorW
SetFileSecurityW
GetFileSecurityW
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
ConvertSidToStringSidW
RegSetValueExW
RegEnumKeyExW
RegDeleteValueW
SetEntriesInAclW
RegQueryValueExW
RegQueryInfoKeyW
OpenProcessToken
CrashForException
DumpProcess
SetActiveURL
SetClientId
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ