Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
b7a12b1537586f39f9b68aa28e5c328f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7a12b1537586f39f9b68aa28e5c328f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b7a12b1537586f39f9b68aa28e5c328f_JaffaCakes118
Size
1.2MB
MD5
b7a12b1537586f39f9b68aa28e5c328f
SHA1
6447930bbbefdf8a13812da57b7dab0f669dc4c0
SHA256
8c910a75545047afc7b68f7673c1ac6dd3bd41ecd64f20be13bf512c3016725c
SHA512
16729181a7363bdf6a35fddb2441b1dc2661893ff2fb1e17fbd30717da4f01e2830fd18380f871608e3e444cc4b684b20e6dc5dfa7548697b16ef1afe6f0b98b
SSDEEP
24576:UbrI3nL+BSJA0zk4EEraEw4jizj6blHPa22yKPKdh9py7hb5e:ArIiBkA0zk4UErjizj69a1yKPKh9Ce
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\b\build\slave\chrome-official\build\src\build\Release\chrome_exe.pdb
PathFileExistsW
PathRemoveFileSpecW
SetEvent
InitializeCriticalSection
LeaveCriticalSection
GetLastError
SetLastError
EnterCriticalSection
ResetEvent
CreateEventW
PostQueuedCompletionStatus
CreateIoCompletionPort
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
TerminateJobObject
CreateThread
SetHandleInformation
VirtualFree
GetProcessHandleCount
LocalFree
ResumeThread
SignalObjectAndWait
InterlockedExchange
InterlockedIncrement
InterlockedDecrement
GetThreadContext
MapViewOfFile
FreeLibrary
VirtualQueryEx
LoadLibraryW
AssignProcessToJobObject
GetExitCodeProcess
VirtualAllocEx
CreateFileMappingW
WriteProcessMemory
RegisterWaitForSingleObject
UnregisterWaitEx
VirtualFreeEx
GetFileAttributesW
CreateFileW
GetLongPathNameW
VirtualProtectEx
QueryDosDeviceW
CreateJobObjectW
GetCurrentProcessId
CreateNamedPipeW
OpenEventW
SearchPathW
CreateMutexW
GetCurrentDirectoryW
lstrlenW
DebugBreak
VirtualQuery
ReadProcessMemory
SuspendThread
ReleaseSemaphore
CreateSemaphoreW
WaitNamedPipeW
WriteFile
TransactNamedPipe
SetNamedPipeHandleState
WaitForMultipleObjects
SystemTimeToFileTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
SetEnvironmentVariableW
ExpandEnvironmentStringsW
UnmapViewOfFile
ReadFile
VirtualAlloc
WaitForSingleObject
GetFileTime
SetFilePointer
FormatMessageA
ReleaseMutex
WideCharToMultiByte
MultiByteToWideChar
GetUserDefaultLangID
GetNativeSystemInfo
GetVersionExW
IsDebuggerPresent
RaiseException
InterlockedExchangeAdd
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
GetStdHandle
RtlCaptureStackBackTrace
SetEndOfFile
FlushFileBuffers
WTSGetActiveConsoleSessionId
FindResourceW
LoadResource
SizeofResource
LockResource
UnhandledExceptionFilter
GetStartupInfoW
HeapFree
LoadLibraryA
GetConsoleCP
GetConsoleMode
SetStdHandle
GetFileType
HeapReAlloc
HeapAlloc
GetProcessHeap
GetCPInfo
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapCreate
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetQueuedCompletionStatus
SetInformationJobObject
TerminateProcess
GetTickCount
GetModuleHandleW
GetCurrentProcess
GetUserDefaultUILanguage
GetSystemDirectoryW
GetWindowsDirectoryW
LocalAlloc
GetThreadLocale
CloseHandle
QueueUserWorkItem
GetTempPathW
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
CreateProcessW
GetCommandLineW
ExitProcess
GetModuleHandleA
SetCurrentDirectoryW
GetProcAddress
GetModuleFileNameW
LoadLibraryExW
GetEnvironmentVariableW
CharUpperW
CreateDesktopW
GetThreadDesktop
CreateWindowStationW
GetProcessWindowStation
GetUserObjectInformationW
CloseWindowStation
CloseDesktop
MessageBoxW
SetProcessWindowStation
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSQueryUserToken
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
timeGetTime
SetSecurityDescriptorDacl
RevertToSelf
RegOpenKeyExW
RegCloseKey
OpenProcessToken
SetThreadToken
CreateProcessAsUserW
SetTokenInformation
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorSacl
GetLengthSid
RegCreateKeyExW
CopySid
CreateWellKnownSid
GetTokenInformation
InitializeSecurityDescriptor
CreateRestrictedToken
EqualSid
DuplicateToken
LookupPrivilegeValueW
DuplicateTokenEx
GetSecurityInfo
ConvertSecurityDescriptorToStringSecurityDescriptorW
SetFileSecurityW
GetFileSecurityW
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
ConvertSidToStringSidW
RegSetValueExW
RegEnumKeyExW
SetEntriesInAclW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegDisablePredefinedCache
CommandLineToArgvW
SHGetFolderPathW
CrashForException
DumpProcess
SetActiveURL
SetClientId
SetCommandLine
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ