Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
d0b02f85a319314b6f30409b7b907658_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d0b02f85a319314b6f30409b7b907658_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d0b02f85a319314b6f30409b7b907658_JaffaCakes118
Size
731KB
MD5
d0b02f85a319314b6f30409b7b907658
SHA1
88ca0c8a463b7c2704d239563c2765d419ed50e5
SHA256
dfe406098cdef5620d6d54b90db2415a353b809446928576f5cab25a63180f02
SHA512
43d68d03bd093d11683b6df1e871ebdadcde73442398c8c7a1bf00129daee713a6adae1682ecca47fd5c8730bc0b44e86c874ca64a582377e1e8ebd125221d86
SSDEEP
12288:yaGloGC2Yjyg0GcleyZKUID5cDgogy8TxdeXwBjI715e3m+ztYs6/akiceS6:yDo52KD/brDjISb8/a0eS6
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\svn\winclient_20.9\winclient\browser\Release\casino_browser.pdb
cef_v8context_get_current_context
cef_cookie_manager_get_global_manager
cef_v8value_create_function
cef_string_list_size
cef_string_list_value
cef_string_list_append
cef_string_map_size
cef_string_map_key
cef_string_map_value
cef_string_map_append
cef_string_multimap_key
cef_string_multimap_value
cef_string_multimap_append
cef_log
cef_string_list_copy
cef_browser_host_create_browser
cef_command_line_get_global
cef_string_map_free
cef_string_map_alloc
cef_string_list_free
cef_string_list_alloc
cef_api_hash
cef_process_message_create
cef_post_data_create
cef_post_data_element_create
cef_request_create
cef_string_multimap_free
cef_string_multimap_alloc
cef_string_userfree_utf16_free
cef_string_utf16_clear
cef_string_utf16_set
cef_string_utf8_clear
cef_do_message_loop_work
cef_shutdown
cef_initialize
cef_execute_process
cef_string_multimap_size
cef_string_utf16_cmp
cef_string_utf16_to_utf8
cef_string_utf8_to_utf16
SymGetLineFromAddr64
SymInitialize
SymSetSearchPathW
SymGetSearchPathW
SymFromAddr
SymSetOptions
CreateProcessW
OpenMutexW
LoadLibraryW
GetProcAddress
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
CreateMutexW
OpenEventW
ReleaseMutex
OpenFileMappingW
UnmapViewOfFile
CreateEventW
Sleep
SetEvent
ResetEvent
CreateFileMappingW
MapViewOfFile
OpenProcess
GetExitCodeProcess
GetCommandLineW
LocalFree
GetModuleFileNameW
GetLastError
SetLastError
HeapSetInformation
GetCurrentProcess
VirtualAllocEx
VirtualQueryEx
GetModuleHandleA
GetVersionExW
GetNativeSystemInfo
GetModuleHandleW
CreateFileW
GetFileAttributesW
GetLongPathNameW
QueryDosDeviceW
VirtualProtectEx
WriteProcessMemory
DuplicateHandle
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
GetCurrentThreadId
GetProcessId
UnregisterWaitEx
TerminateJobObject
SetInformationJobObject
RegisterWaitForSingleObject
TerminateProcess
GetTickCount
GetUserDefaultLangID
GetUserDefaultLCID
WriteFile
OutputDebugStringA
IsDebuggerPresent
RaiseException
GetThreadContext
AssignProcessToJobObject
GetFileType
ProcessIdToSessionId
SetHandleInformation
GetProcessHandleCount
VirtualFree
SignalObjectAndWait
GetCurrentDirectoryW
ReadFile
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
GetModuleHandleExW
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
FlushFileBuffers
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
ReadProcessMemory
SuspendThread
ResumeThread
DebugBreak
lstrlenW
SearchPathW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LCMapStringW
GetLocaleInfoW
GetCPInfo
WaitForSingleObjectEx
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
LoadLibraryExW
GetConsoleCP
GetConsoleMode
ExitProcess
SetStdHandle
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentProcessId
DeleteCriticalSection
CreateThread
CloseHandle
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStdHandle
GetACP
CompareStringW
DecodePointer
EncodePointer
GetStringTypeW
IsValidLocale
EnumSystemLocalesW
GetTimeZoneInformation
WriteConsoleW
GetProcessHeap
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
ReadConsoleW
HeapSize
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
CloseDesktop
SetWindowTextW
SendMessageW
GetClassLongW
EnableWindow
ShowWindow
SetWindowPos
CreateRestrictedToken
CopySid
RegOpenKeyExW
RegDisablePredefinedCache
RevertToSelf
RegCreateKeyExW
RegCloseKey
SystemFunction036
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertStringSidToSidW
SetSecurityInfo
SetTokenInformation
SetKernelObjectSecurity
GetSecurityDescriptorSacl
GetLengthSid
GetKernelObjectSecurity
GetAce
OpenProcessToken
DuplicateToken
DuplicateTokenEx
EqualSid
GetTokenInformation
LookupPrivilegeValueW
CreateProcessAsUserW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
SHGetFolderPathW
ShellExecuteW
CommandLineToArgvW
timeGetTime
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ