__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
f1bf4af2a5c6205008e7f8ef44498bd5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f1bf4af2a5c6205008e7f8ef44498bd5_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
f1bf4af2a5c6205008e7f8ef44498bd5_JaffaCakes118
Size
257KB
MD5
f1bf4af2a5c6205008e7f8ef44498bd5
SHA1
88b1cfa6add5f127e09b3da1648ae5fbaebee117
SHA256
c42548ad5e4c7472c5a352ee885e7d3fd9acf863b28c41e8dba0619cf94177aa
SHA512
f06a4ed0163f3ea3582177acd59b8c285954a15a2f876e5572512659f227657e3624cd8203f55ac67753767fe06724aebc046a098d2e1e0f3ce39d3721737b7d
SSDEEP
6144:7pXemv+hB57p8ZH2D0HvcGdoZEqjokNe8538F0qhV9ZYUUwSzS:7pXemvQd8h2D0HvcGGPjxa90S
Checks for missing Authenticode signature.
resource |
---|
f1bf4af2a5c6205008e7f8ef44498bd5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
URLDownloadToFileA
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegFlushKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
CloseHandle
CompareStringA
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetDriveTypeA
GetEnvironmentStrings
GetExitCodeThread
GetFileAttributesA
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeExA
GetStringTypeW
GetThreadLocale
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
ReadFile
RemoveDirectoryA
ResetEvent
RtlUnwind
SetConsoleCtrlHandler
SetEndOfFile
SetEvent
SetFileAttributesA
SetFilePointer
SetHandleCount
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpynA
lstrlenA
WSAAsyncSelect
WSACleanup
WSAStartup
connect
htons
ioctlsocket
recv
send
shutdown
socket
GetFileTitleA
ShellExecuteA
BlockInput
CallNextHookEx
CharNextA
CreateWindowExA
DefWindowProcA
DispatchMessageA
EnumThreadWindows
ExitWindowsEx
GetActiveWindow
GetKeyState
GetKeyboardType
GetMessageA
GetSystemMetrics
GetWindowTextA
KillTimer
LoadStringA
MessageBoxA
PostQuitMessage
RegisterClassA
SetTimer
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
wsprintfA
SafeArrayCreate
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VarBoolFromStr
VarBstrFromBool
VarBstrFromCy
VarBstrFromDate
VarCyFromStr
VarDateFromStr
VarI4FromStr
VarNeg
VarNot
VarR8FromStr
VariantChangeTypeEx
VariantClear
VariantCopy
VariantCopyInd
VariantInit
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ