@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
lib_Busca
Static task
static1
Behavioral task
behavioral1
Sample
isavShow.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
isavShow.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
isavShow.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
isavShow.exe
Resource
win10v2004-20240508-en
Target
3eea38787797a6e19042234cef85ef10_JaffaCakes118
Size
32KB
MD5
3eea38787797a6e19042234cef85ef10
SHA1
18a3e01a15d9774fce6901862171b14b4dffda67
SHA256
8406cc8584385be87f342dca58a8505783ca6c10f3d44ba5d36700a15f67fbf2
SHA512
d59fb93a9495024728240da98b09f2d665de0ce6e1e9aa5f651d6cc283c487038411ed0cc6c96b99fcc4bc355eb2c6cb789e09d13e16ffd9c68f9020ca6f9b08
SSDEEP
768:OdGnw5YQTd0/5gsnQ1JapNfU4zFwgkfaVgtbXGhs2G25Av/fvsp:OQIYm+/5vQ1JG24Sg0Bti2q
Checks for missing Authenticode signature.
resource |
---|
unpack001/isavShow.dll |
unpack001/isavShow.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetModuleFileNameA
CreateProcessA
DeleteFileA
CloseHandle
ExitProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
EnterCriticalSection
CreateFileA
GetCommandLineA
GetCurrentDirectoryA
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
FindFirstFileA
FreeEnvironmentStringsA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetTimeZoneInformation
GetVersion
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
MoveFileA
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
GetLocalTime
MessageBoxA
EnumThreadWindows
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
lib_Busca
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CIcos
_adj_fptan
__vbaStrI4
__vbaFreeVar
__vbaLateIdCall
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaRecAnsiToUni
__vbaStrCat
__vbaLsetFixstr
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaExitProc
ord595
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
__vbaStrFixstr
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
__vbaGenerateBoundsError
ord529
__vbaStrCmp
__vbaI2I4
DllFunctionCall
__vbaCastObjVar
_adj_fpatan
__vbaLateIdCallLd
__vbaRecUniToAnsi
EVENT_SINK_Release
__vbaUI1I2
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
ord716
__vbaFPException
ord645
_CIlog
__vbaErrorOverflow
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaI4Var
__vbaVarDup
_CIatan
__vbaCastObj
__vbaStrMove
_allmul
__vbaLateIdSt
_CItan
_CIexp
__vbaFreeStr
__vbaFreeObj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ