Extended Key Usages
ExtKeyUsageCodeSigning
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
94f407e8615ebe091ccf5035197ea1ea_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
94f407e8615ebe091ccf5035197ea1ea_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
94f407e8615ebe091ccf5035197ea1ea_JaffaCakes118
Size
1.1MB
MD5
94f407e8615ebe091ccf5035197ea1ea
SHA1
89c8938057a1b0514e3805536ccf3d2eb4acb1e0
SHA256
14fe0fa7e16253e53ce4c25616e08006ad09330bea8df9161a47b2815cd83067
SHA512
08ec9d99d753e9239d89a9081276329e51adb2d3414447b103eae8dcd21f02dabc86a39abd4f8405cec076dfdc74133796eb4117285add6bd13826de5c99e423
SSDEEP
24576:JAkh6SRcwxbc0x7A2JHQWP5Nx8ubFKD8L1QA/:JAe6Spxb9xc2JHXP3xBpD1Qw
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableW
GetFileAttributesExW
GetFileSizeEx
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetPrivateProfileSectionW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
GetConsoleOutputCP
LoadLibraryW
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LocalReAlloc
LockResource
MultiByteToWideChar
OpenEventW
OpenProcess
OpenThread
OutputDebugStringW
Process32FirstW
Process32NextW
QueryPerformanceCounter
RaiseException
ReadFile
ReleaseMutex
RtlUnwind
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetFilePointer
SetFilePointerEx
SetHandleCount
SetLastError
SetStdHandle
SetThreadUILanguage
SetUnhandledExceptionFilter
SizeofResource
Sleep
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
lstrcmpiW
lstrcpynA
lstrcpynW
lstrlenA
lstrlenW
GetConsoleCP
GetConsoleMode
GetCommandLineW
GetCommandLineA
GetCPInfo
GetAtomNameW
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageW
FlushInstructionCache
FlushFileBuffers
FindResourceW
FindResourceExW
FindAtomW
ExitProcess
EnumSystemLocalesA
EnterCriticalSection
DeviceIoControl
DeleteCriticalSection
DeleteAtom
CreateToolhelp32Snapshot
CreateThread
CreateProcessW
CreateMutexW
CreateFileW
CreateFileA
CreateEventW
CreateDirectoryW
CompareStringW
CompareStringA
CloseHandle
LoadLibraryExW
AddAtomW
UnregisterClassA
TranslateMessage
SetWindowLongW
SetTimer
SendMessageTimeoutW
RegisterClassW
RegisterClassExW
PostThreadMessageW
PostMessageW
PeekMessageW
MessageBoxW
LoadStringW
GetKeyboardLayout
KillTimer
IsWindow
GetWindowLongW
GetMessageW
GetClassInfoExW
GetActiveWindow
VkKeyScanA
GetKeyboardType
IsWindowUnicode
IsCharLowerW
CallWindowProcW
CharNextW
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageW
ExitWindowsEx
GetCaretBlinkTime
GetLastActivePopup
LoadCursorFromFileW
GetMenuContextHelpId
GetWindowContextHelpId
GetParent
DestroyMenu
LoadIconA
GetSysColorBrush
IsIconic
GetMessageExtraInfo
GetOpenClipboardWindow
AnyPopup
LoadCursorW
FindWindowW
InSendMessage
GetTextAlign
GetGraphicsMode
GetTextCharset
UpdateColors
EndDoc
GetBkColor
GetDCBrushColor
CreateSolidBrush
UnrealizeObject
CreateMetaFileW
CloseFigure
PathToRegion
GetStockObject
RegCloseKey
RegCreateKeyExW
RegOpenKeyExA
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteKeyW
SHGetSpecialFolderPathW
CommandLineToArgvW
ShellExecuteW
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoCreateInstance
CoUninitialize
StrCpyNW
StrCmpNIW
StrCmpIW
SHGetValueW
StrStrIA
PathIsDirectoryW
PathFindFileNameW
PathFileExistsW
PathCombineW
PathAppendW
StrStrIW
UrlGetPartA
wvnsprintfW
PathRemoveFileSpecW
InitCommonControlsEx
ImmDisableIME
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ