@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
032b01e2fde0e4366efdc05205c282ad_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
032b01e2fde0e4366efdc05205c282ad_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
032b01e2fde0e4366efdc05205c282ad_JaffaCakes118
Size
211KB
MD5
032b01e2fde0e4366efdc05205c282ad
SHA1
710406d42a29c66c655554b7ec591de4b1d141a2
SHA256
94e8af936a59c4fad943d6d278e15a04cecc91afa116033b52b5849903abaae5
SHA512
8904bf3e1251872b8168a27c034bdce6c1fa52ec542cbe14a8fb7dc0f106013c0e19950bab84e70a4c1e323146634cfa71f9f8b9b25523f6528a16bd36ba8e29
SSDEEP
6144:htGM37zkzQ2zI5N76Sg/yYPPPfUJXiev:JhgRPPs5v
Checks for missing Authenticode signature.
resource |
---|
032b01e2fde0e4366efdc05205c282ad_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
CloseHandle
CreateDirectoryA
CreateFileA
CreateFileW
CreateProcessA
DeleteFileA
DeleteFileW
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentVariableA
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetFileTime
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetTickCount
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalUnlock
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFileTimeToFileTime
LocalFree
MoveFileA
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetFilePointer
SetFileTime
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
BitBlt
CreateBitmap
CreateCompatibleDC
CreateDIBPatternBrush
CreateDIBPatternBrushPt
CreateDIBitmap
CreatePalette
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
ExtTextOutA
GetDeviceCaps
GetStockObject
GetTextExtentPoint32A
GetTextExtentPointA
LineTo
MoveToEx
PatBlt
RealizePalette
Rectangle
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBitsToDevice
SetTextColor
TextOutA
AdjustWindowRect
BeginPaint
BringWindowToTop
CallWindowProcA
CheckRadioButton
CreateCaret
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DestroyCursor
DestroyIcon
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawFocusRect
DrawMenuBar
DrawTextA
EnableMenuItem
EnableWindow
EndDialog
EndPaint
EnumThreadWindows
FillRect
FindWindowA
FreeDDElParam
GetClassInfoA
GetClassNameA
GetClientRect
GetCursorPos
GetDC
GetDlgCtrlID
GetDlgItem
GetFocus
GetParent
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
HideCaret
InvalidateRect
InvertRect
IsDialogMessageA
IsDlgButtonChecked
IsWindowEnabled
IsWindowVisible
LoadCursorA
LoadIconA
MessageBoxA
MoveWindow
PeekMessageA
PostMessageA
PostQuitMessage
PtInRect
RegisterClassA
RegisterClassExA
ReleaseCapture
ReleaseDC
ScreenToClient
ScrollWindow
SendDlgItemMessageA
SendMessageA
SetCapture
SetCaretPos
SetCursor
SetCursorPos
SetFocus
SetMenu
SetWindowLongA
SetWindowTextA
ShowCaret
ShowWindow
TranslateAcceleratorA
TranslateMessage
UnpackDDElParam
UpdateWindow
ValidateRect
WaitMessage
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE