Extended Key Usages
ExtKeyUsageCodeSigning
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2e79cdbba8af50759fbdbbb60cceca40.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2e79cdbba8af50759fbdbbb60cceca40.exe
Resource
win10v2004-20241007-en
Target
JaffaCakes118_2e79cdbba8af50759fbdbbb60cceca40
Size
190KB
MD5
2e79cdbba8af50759fbdbbb60cceca40
SHA1
d97095b06aea8f403b700c5a8fbacae92897a82b
SHA256
49db3745e4e628ababbe9de776cb83d9ca5dd36d39c19c722817b35d7ba80f75
SHA512
b5f59467753c063b5993480e609e85d4ec42b8f940211daf2f4df508c841f5631d5f6856173954b4c0f273b6d002a190d662c2f3a965fb6d0835c19724cc423e
SSDEEP
3072:BWKTFHAN8WibywwgMOhJSqbz3sZm3V46uy:gKTt99sZmF46l
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
GetWindowsDirectoryW
lstrcatW
CreateFileW
VirtualAllocEx
GetModuleHandleA
GetProcAddress
LoadIconA
RegOpenKeyW
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ