Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6e59b7f6c90dd0f33c0a94525ad4a74d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6e59b7f6c90dd0f33c0a94525ad4a74d.exe
Resource
win10v2004-20241007-en
Target
JaffaCakes118_6e59b7f6c90dd0f33c0a94525ad4a74d
Size
240KB
MD5
6e59b7f6c90dd0f33c0a94525ad4a74d
SHA1
c12973597c075822ffa5accf290f02441fd422cd
SHA256
a45e5df6cfa9d6cc373dda8cc2a7bb8fc61e5efc101ff0a8974a0c76abf3f709
SHA512
91ad1f3565222295896f94918bcfc7c980db65bd19c110e6e73c12447ff7d6c8b181b04145f91931e9206b3384464d28b121de0777b0fce346ac7a2aea0f519c
SSDEEP
6144:PCjwi1P9gVmZK7YE5CkZ6p5fGfyzvacs6IaVgAyWYd:pi1PJO1CkZ6p5u6Tw6/VoWYd
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Beep
CreateMailslotW
FatalAppExitA
AddAtomA
WaitForSingleObject
lstrcmpW
SetComputerNameW
LoadLibraryW
GetCurrentDirectoryW
GetUserDefaultLCID
lstrcpynW
IsBadStringPtrA
GetLogicalDriveStringsA
GetSystemTime
GetProcessHeaps
GetLongPathNameA
GetExitCodeThread
GetModuleHandleW
GlobalGetAtomNameW
GetSystemDefaultLCID
GetFullPathNameA
CreateNamedPipeA
GetAtomNameA
LocalAlloc
GetDiskFreeSpaceW
ExpandEnvironmentStringsA
GetMailslotInfo
IsBadReadPtr
OpenEventA
GetModuleFileNameW
GetEnvironmentVariableA
GetSystemDirectoryA
GetStringTypeW
MulDiv
RaiseException
GlobalAlloc
RemoveDirectoryA
SetEvent
FindResourceW
OpenFile
FatalAppExitW
ExitProcess
SetLocaleInfoA
GetSystemDefaultLangID
IsValidCodePage
CopyFileExA
GetVersionExA
SetErrorMode
EnumTimeFormatsA
GlobalFindAtomW
ExpandEnvironmentStringsW
MoveFileW
SetCalendarInfoA
lstrcpynA
GetTempFileNameA
SleepEx
ReplaceFileW
CompareFileTime
lstrlenA
OpenWaitableTimerW
GetLongPathNameW
GetStringTypeA
GetCurrentThreadId
GetThreadLocale
OpenSemaphoreW
lstrcpy
QueryPerformanceCounter
GetLocalTime
WaitForMultipleObjects
CreateDirectoryW
LoadLibraryExA
GetCPInfo
BeginUpdateResourceW
OpenMutexW
WinExec
RemoveDirectoryW
CreateSemaphoreW
GetComputerNameA
CreatePipe
GetStartupInfoW
GetVersionExW
SetCurrentDirectoryA
GetShortPathNameA
BeginUpdateResourceA
CreateEventA
CreateMailslotA
DuplicateHandle
GetLastError
FindAtomW
GetProcAddress
lstrcat
lstrcmpiW
GetVersion
lstrcpyA
DeleteAtom
GetTempFileNameW
GetOEMCP
MultiByteToWideChar
LoadResource
EnumCalendarInfoW
GetMessageA
DialogBoxIndirectParamW
IsWindow
GetScrollPos
CreateWindowExW
GetSystemMetrics
SetFocus
CreatePopupMenu
EndMenu
SetDlgItemInt
LoadCursorA
ShowCursor
WinHelpW
GetMenuItemInfoW
UpdateLayeredWindow
PeekMessageW
GetMenuItemRect
GetKeyboardLayout
MoveWindow
GetForegroundWindow
PostMessageW
keybd_event
ActivateKeyboardLayout
EnumClipboardFormats
SendMessageW
GetDlgItemInt
DefWindowProcW
GetMenuItemInfoA
LoadMenuIndirectW
SetWindowTextW
InsertMenuA
MessageBoxIndirectW
CreateAcceleratorTableW
MessageBoxIndirectA
SendDlgItemMessageW
CreateDialogIndirectParamW
CharLowerW
GetIconInfo
GetMenu
ShowCaret
CharLowerA
SetMenu
GetCapture
WaitMessage
PostMessageA
RegisterClassA
SetCursorPos
EnumWindows
GetMenuItemCount
wsprintfA
mouse_event
InsertMenuItemW
EnableWindow
RegisterWindowMessageW
OffsetRect
CreateDesktopA
CreateAcceleratorTableA
GetActiveWindow
SelectBrushLocal
CreateCompatibleDC
LookupAccountNameA
ConvertStringSecurityDescriptorToSecurityDescriptorW
Shell_NotifyIcon
ExtractIconA
StrCpyNW
glRenderMode
glTexEnviv
glTexGeni
glRectsv
glNormal3sv
glLightiv
glColor4us
glTexCoord3s
glCallLists
glEdgeFlagPointer
glColor4usv
glIndexi
glGetTexLevelParameterfv
glGenLists
glVertex4iv
glTexCoord4iv
glNormal3b
glColor3ubv
wglChoosePixelFormat
DllUnregisterServer
AsyncGetClassBits
URLDownloadW
DllRegisterServer
RevokeFormatEnumerator
CreateURLMonikerEx
CoInternetGetSecurityUrl
ZonesReInit
RegisterFormatEnumerator
ObtainUserAgentString
HlinkNavigateMoniker
GetComponentIDFromCLSSPEC
SetSoftwareUpdateAdvertisementState
URLDownloadToFileA
URLOpenStreamA
GetMarkOfTheWeb
URLOpenPullStreamW
URLOpenPullStreamA
IsLoggingEnabledW
HlinkNavigateString
RtmIsRoute
RtmDeleteRoute
_GetServiceKeyName_@16
_EnumFontFamiliesEx_@20
_GetDiskFreeSpaceEx_@16
_SystemParametersInfo_@16
_RegQueryValueEx_@24
_CreateMDIWindow_@40
_NDdeSetShareSecurity_@16
_LogonUser_@24
_InitiateSystemShutdown_@20
_PeekMessage@20
_ResetDC_@8
GetTypeByNameW
dn_expand
WSAUnhookBlockingHook
bind
WSACancelBlockingCall
WSAStartup
SetServiceW
WSAAsyncGetProtoByNumber
WSAIsBlocking
GetAcceptExSockaddrs
accept
EnumProtocolsA
connect
GetNameByTypeW
getprotobynumber
NPLoadNameSpaces
htonl
ioctlsocket
s_perror
inet_addr
WSAAsyncSelect
gethostbyaddr
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ