@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
30c3dd5713c5f08798c8822492336b99_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
30c3dd5713c5f08798c8822492336b99_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
30c3dd5713c5f08798c8822492336b99_JaffaCakes118
Size
4.3MB
MD5
30c3dd5713c5f08798c8822492336b99
SHA1
e9b1da965ebcd777c606de6c72f2689eecdcee04
SHA256
d6f118a7be3dc9d88bdc5a50e5834e527273742d2d52f73e7d21f711d4be46a2
SHA512
3f4761d19f932583e12e01f1d82d2a06f34dbcb55d06685d48faaaf3ecc2fa36233b4fc416efa3d93758f4cd8a003abc0449ea1ae06d7d85f387add286a3f40f
SSDEEP
98304:ZE0VhYqnTi82BsqdVGV2+ibiQMkFo9Aqwge:WknO8qGV2g+WAq7e
Checks for missing Authenticode signature.
resource |
---|
30c3dd5713c5f08798c8822492336b99_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CreateFileA
CreateProcessA
CreateThread
EnterCriticalSection
ExitProcess
ExitThread
FindResourceA
FormatMessageA
GetACP
GetCPInfo
GetCommandLineA
GetComputerNameA
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTime
GetTempPathA
GetVersion
GetVersionExA
GetVolumeInformationA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LoadResource
LocalAlloc
LocalFree
LocalSize
MultiByteToWideChar
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetThreadPriority
SizeofResource
Sleep
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
lstrcatA
lstrlenA
InitCommonControls
BeginPath
BitBlt
CombineRgn
CreateCompatibleBitmap
CreateCompatibleDC
CreateEllipticRgn
CreateFontA
CreatePolygonRgn
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
EndPath
FrameRgn
GetDIBits
PathToRegion
Polygon
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
SetDIBits
SetPixelV
TextOutA
BeginPaint
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EndPaint
EnumThreadWindows
FindWindowA
GetDC
GetMessageA
GetSystemMetrics
InvalidateRect
LoadBitmapA
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendMessageA
SetForegroundWindow
SetWindowRgn
ShowWindow
TranslateMessage
UpdateWindow
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ