___CPPdebugHook
i
Static task
static1
Behavioral task
behavioral1
Sample
f828cf105818989a0b0d8c1e8de80db9_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f828cf105818989a0b0d8c1e8de80db9_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f828cf105818989a0b0d8c1e8de80db9_JaffaCakes118
Size
259KB
MD5
f828cf105818989a0b0d8c1e8de80db9
SHA1
20dae746a54905c4bbd451436cfa857ea5adf72f
SHA256
d2a4509296ab17704468597c70dc4f9a3fa76784061a66ca26ea5598e82e996a
SHA512
774b5155ca43f81219ecdde1eceeb98308b3af0606f5fa1e70dea1e261beb5cc72e1974eb3c48367034c588a4d2e2cfdcd862129092017fb5f731fb1e4e8d453
SSDEEP
3072:VhHhzLTStqeTbB+MhyyqkGvJqc2coR7nRzH8qzVpqr4c4cLUQT9zRMX1oMOumWLk:Z/qV1+MhyyqkTz18q7qx4YT9zRMFH9s
Checks for missing Authenticode signature.
resource |
---|
f828cf105818989a0b0d8c1e8de80db9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
CloseHandle
CompareStringA
CopyFileA
CreateEventA
CreateFileA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DebugBreak
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceA
GetEnvironmentStrings
GetFileSize
GetFileTime
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTickCount
GetUserDefaultLCID
GetVersion
GetVersionExA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFree
MoveFileExA
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
RaiseException
ReadFile
ResetEvent
RtlUnwind
SetConsoleCtrlHandler
SetEndOfFile
SetEvent
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetThreadLocale
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
GetVolumeInformationA
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
recv
send
setsockopt
CharLowerBuffA
CharNextA
DispatchMessageA
EnumChildWindows
EnumThreadWindows
FindWindowExA
GetClassNameA
GetDesktopWindow
GetKeyboardType
GetMessageA
GetSystemMetrics
LoadStringA
MessageBoxA
SendMessageA
TranslateMessage
wsprintfA
CoCreateInstance
CoInitialize
CoUninitialize
OleRun
GetErrorInfo
SafeArrayCreate
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SysAllocString
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VarBoolFromStr
VarBstrFromBool
VarBstrFromCy
VarBstrFromDate
VarCyFromStr
VarDateFromStr
VarI4FromStr
VarNeg
VarNot
VarR8FromStr
VariantChangeType
VariantChangeTypeEx
VariantClear
VariantCopy
VariantCopyInd
VariantInit
WSASocketA
___CPPdebugHook
i
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ