@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
08f1a47f205223e3d944d070d6940f38_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
08f1a47f205223e3d944d070d6940f38_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
08f1a47f205223e3d944d070d6940f38_JaffaCakes118
Size
92KB
MD5
08f1a47f205223e3d944d070d6940f38
SHA1
ab6a65d4f337fcd15ba7e9ddc535a4e308181b04
SHA256
6cba90e70e0ab3086e09ab0fab59f9a7ea8c864cc174ff809a0f69036d5573a3
SHA512
92e1d3bb94d501f0fea4013255134035c2e0fd457a909920b3909803a6f6c892f57aa6a643e347928098f580fdd3465077183c983b21feb0e8cf8eb1efc444d6
SSDEEP
1536:yPbZIiGMJoQYplg5CgyUwR6AsgetWx+tP5GsGi/GGMR1Pa8hihjl1Nb3:AbyiGhqyUwRhmx/GG0Pm
Checks for missing Authenticode signature.
resource |
---|
08f1a47f205223e3d944d070d6940f38_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Beep
CloseHandle
CreateFileA
DeleteFileA
EnterCriticalSection
ExitProcess
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetACP
GetCPInfo
GetCommandLineA
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLargestConsoleWindowSize
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
ReadConsoleInputA
RtlUnwind
ScrollConsoleScreenBufferA
SetConsoleCtrlHandler
SetConsoleCursorPosition
SetConsoleMode
SetConsoleScreenBufferSize
SetConsoleWindowInfo
SetFilePointer
SetHandleCount
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteConsoleOutputA
WriteFile
EnumThreadWindows
MessageBoxA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ