__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
b1f7760e195be336cc508a5a73c7219e_JaffaCakes118.exe
Resource
win7-20240611-en
Target
b1f7760e195be336cc508a5a73c7219e_JaffaCakes118
Size
461KB
MD5
b1f7760e195be336cc508a5a73c7219e
SHA1
f9f524a10ba1b8f390933701d866e7daccc2fbd6
SHA256
40d164642df6cdb5d5589c7e807fec631f205c04826a462db4baa0f32abc90d8
SHA512
8e1d0ae90f802bff8bbea530ff564f724c59ad84274f962aeae479ec3f1b7503fe627cade50df6cf6731ad0e5160e5e71b60eeaf2c74f7061a3cbe941ebf990b
SSDEEP
6144:x5Uu9ZojgLzsqBZWkkavbVp2aYscjJLaojiSn46CqV6LhwHL7iPQp0ZESurehwjS:UuToYj2aQLG7f46liyPQp0mS4Ti73
Checks for missing Authenticode signature.
resource |
---|
b1f7760e195be336cc508a5a73c7219e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
SetFileSecurityW
Beep
CloseHandle
CreateFileA
CreateFileW
DeleteFileA
ExitProcess
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
FlushConsoleInputBuffer
GetACP
GetCPInfo
GetCommandLineA
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileAttributesW
GetFileType
GetLargestConsoleWindowSize
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetNumberOfConsoleInputEvents
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTimeZoneInformation
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LCMapStringA
LoadLibraryA
LoadLibraryW
MultiByteToWideChar
RaiseException
ReadConsoleInputA
ReadFile
RtlUnwind
ScrollConsoleScreenBufferA
SetConsoleCtrlHandler
SetConsoleCursorPosition
SetConsoleMode
SetConsoleScreenBufferSize
SetConsoleWindowInfo
SetFilePointer
SetHandleCount
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteConsoleInputA
WriteConsoleOutputA
WriteFile
CommandLineToArgvW
EnumThreadWindows
MessageBoxA
ShowWindow
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ