Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
eecc12048d1de87180ade47fa3153364_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eecc12048d1de87180ade47fa3153364_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
eecc12048d1de87180ade47fa3153364_JaffaCakes118
Size
225KB
MD5
eecc12048d1de87180ade47fa3153364
SHA1
8da1b523eaf3f04ba7442129a7a68fecdc42930d
SHA256
7015d6b71f75bf98c359fa5f57e91ae4b23346c057541cdd242faacc38b4985d
SHA512
26910676062a90832db9832e76b30e653e76775b2a3732fb63739533aa9b7f0a7f7862441d88700ccc0abbb54ad9e805020cd9a9754be7f35f8cb79d8f683024
SSDEEP
3072:4Eyy0yReKfVGHA8XgSdTpu1zy/biiZlzvXsbUbWZmzYmpAoWOg9VaHlH+PKP9ok:TyOLmXgM49EBZvXJb/cmjWRMW8T
metasploit
encoder/shikata_ga_nai
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\src\Pstools\pslist\Release\pslist.pdb
WNetAddConnection2A
WNetCancelConnection2A
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
NetApiBufferFree
NetServerEnum
inet_ntoa
gethostbyname
WSAStartup
gethostname
FileTimeToSystemTime
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
SetConsoleCursorPosition
SetConsoleCtrlHandler
SetPriorityClass
GetCurrentProcess
GetComputerNameA
GetLastError
SetLastError
GetTickCount
CloseHandle
CreateFileA
FreeLibrary
WriteFile
FormatMessageA
LoadLibraryExA
LockResource
SizeofResource
LoadResource
GetDateFormatA
DeleteFileA
GetSystemDirectoryA
WaitForSingleObject
WideCharToMultiByte
GetVersion
GetModuleFileNameA
SetEvent
ConnectNamedPipe
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetTimeFormatA
Sleep
GetStdHandle
GetConsoleScreenBufferInfo
FillConsoleOutputCharacterA
GetProcAddress
lstrcpynA
LocalAlloc
GetCommandLineW
LoadLibraryA
LocalFree
GetModuleHandleA
IsBadStringPtrA
lstrlenA
IsValidLocale
HeapSize
SetFilePointer
SetEnvironmentVariableA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
ReadFile
GetTimeZoneInformation
SetEndOfFile
GetProcessHeap
CompareStringA
CompareStringW
FindResourceA
HeapAlloc
HeapFree
RtlUnwind
GetModuleHandleW
ExitProcess
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
ExitThread
ResumeThread
CreateThread
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetCommandLineA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThread
LCMapStringA
MultiByteToWideChar
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
DeleteCriticalSection
FatalAppExitA
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
HeapDestroy
GetStringTypeA
GetStringTypeW
InterlockedExchange
InitializeCriticalSectionAndSpinCount
GetConsoleCP
FlushFileBuffers
SetHandleCount
SetWindowTextA
LoadCursorA
EndDialog
InflateRect
SendMessageA
GetSysColorBrush
GetDlgItem
DialogBoxIndirectParamA
wsprintfA
SetCursor
SetMapMode
StartDocA
StartPage
EndPage
EndDoc
GetDeviceCaps
PrintDlgA
StartServiceA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
LogonUserA
ImpersonateLoggedOnUser
RegConnectRegistryA
RevertToSelf
DeleteService
ControlService
OpenSCManagerA
OpenServiceA
QueryServiceStatus
CreateServiceA
CloseServiceHandle
RegCreateKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ