__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
7794a70d58956310b66c7b55515e6576_JaffaCakes118.exe
Resource
win7-20240221-en
Target
7794a70d58956310b66c7b55515e6576_JaffaCakes118
Size
461KB
MD5
7794a70d58956310b66c7b55515e6576
SHA1
26b113201902827b1b04398098c2a0272e2ed790
SHA256
c2f3c1c4dfcc247a6e242ada6b4dda3d5cf9dbecb054e0af7d3858f40428261a
SHA512
4f6a2a679d57bbe570fdd6210c138660529ab8e6808a0776b61569de9e37121264ae7d09ef75326da056a50d47fbe5342411da327d975c0c378d91a320c1e93b
SSDEEP
6144:x5Uu9ZojgLzsqBZWkkavbVp2aYscjJLaojiSn46CqV6LhwHL7iPQp0ZESurehwjJ:UuToYj2aQLG7f46liyPQp0mS4Ti7s
Checks for missing Authenticode signature.
resource |
---|
7794a70d58956310b66c7b55515e6576_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
SetFileSecurityW
Beep
CloseHandle
CreateFileA
CreateFileW
DeleteFileA
ExitProcess
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
FlushConsoleInputBuffer
GetACP
GetCPInfo
GetCommandLineA
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileAttributesW
GetFileType
GetLargestConsoleWindowSize
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetNumberOfConsoleInputEvents
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTimeZoneInformation
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LCMapStringA
LoadLibraryA
LoadLibraryW
MultiByteToWideChar
RaiseException
ReadConsoleInputA
ReadFile
RtlUnwind
ScrollConsoleScreenBufferA
SetConsoleCtrlHandler
SetConsoleCursorPosition
SetConsoleMode
SetConsoleScreenBufferSize
SetConsoleWindowInfo
SetFilePointer
SetHandleCount
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteConsoleInputA
WriteConsoleOutputA
WriteFile
CommandLineToArgvW
EnumThreadWindows
MessageBoxA
ShowWindow
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ