Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
fda12aba8834d90671697484a1b59ec0_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fda12aba8834d90671697484a1b59ec0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
fda12aba8834d90671697484a1b59ec0_JaffaCakes118
Size
263KB
MD5
fda12aba8834d90671697484a1b59ec0
SHA1
ece6bfe275af8b49157c45764234662fbe11a3d2
SHA256
5ae015ab297bdd165ccc40d6490d24f948a3f311e5454e7ab35d3c1ce59ba9c5
SHA512
a0577227584b2ee587173e10b5c66a213c8a0e533d65a1b8a970af254eeeaf58b2cd013ca81d7f798ca22f1146bcbf0038caf3568f21e6ddc11272e7f3e25733
SSDEEP
6144:ofQMMq3zUs0sBDoDQWebbEzHY5/AOJ2kGBme0DY8:oYOTDwbebbN9nOmDY8
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\rdm\projects\39454\out\Release\chrome_elf.dll.pdb
GetLastError
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
CreateRemoteThread
IsDebuggerPresent
SetLastError
WriteFile
CreateFileW
CloseHandle
GetCurrentDirectoryW
FormatMessageA
GetTickCount
WaitForSingleObject
GetCurrentThreadId
Sleep
RaiseException
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
GetModuleHandleExW
GetSystemTimeAsFileTime
QueryPerformanceCounter
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
DeleteCriticalSection
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
SetEvent
ReadFile
ReadConsoleW
SetFilePointerEx
FlushFileBuffers
FindClose
HeapAlloc
HeapReAlloc
HeapFree
ReadProcessMemory
WriteProcessMemory
VirtualProtectEx
GetStdHandle
GetFileType
SleepEx
TerminateProcess
HeapSize
WriteConsoleW
GetTimeZoneInformation
EnumSystemLocalesW
GetCommandLineW
GetVersionExW
GetCurrentProcess
GetProcAddress
GetProcessId
GetCurrentProcessId
GetModuleHandleW
VirtualProtect
GetCommandLineA
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetUserDefaultLCID
IsValidLocale
FreeLibrary
GetStringTypeW
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
RtlUnwind
InterlockedFlushSList
LoadLibraryExW
ExitProcess
GetConsoleCP
GetConsoleMode
SetStdHandle
GetProcessHeap
GetModuleFileNameA
GetACP
TraceEvent
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegCreateKeyExW
RegCloseKey
AddDllToBlacklist
ClearCrashKeyValueImpl
CrashForException
DumpProcessWithoutCrash
GetBlacklistIndex
GetHandleVerifier
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsBlacklistInitialized
SetCrashKeyValueImpl
SignalChromeElf
SuccessfullyBlocked
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ