@__lockDebuggerData$qv
@__unlockDebuggerData$qv
ExtractCabinet
ExtractFileEvent
ProgressEvent
SizeCabinetDescomp
__DebuggerHookData
__GetExceptDLLinfo
isRebootNeeded
userAbort
Static task
static1
Behavioral task
behavioral1
Sample
3ea909a94180a6d92a1532dbe6f7ec55_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ea909a94180a6d92a1532dbe6f7ec55_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
3ea909a94180a6d92a1532dbe6f7ec55_JaffaCakes118
Size
5.0MB
MD5
3ea909a94180a6d92a1532dbe6f7ec55
SHA1
3c89aa7d6b2292bbb478b7a25a2c4273ca68e45d
SHA256
1ee097d44c678c79591ad8fc73e1d7b9774d2525b6f8ca0405bf872c0cac0106
SHA512
7e515aafa8b2541c7aeb8ac51731610bcd859814c4499f4cfb35d07aee2105652355abec3268a7c889d71fe285f4033a9a943399b861df033232e5596688f78d
SSDEEP
98304:GP0Nk2iqTTP9r+x/XhLEPFk3M0hjE202yLpTmdqX/HwrNlH6ybbg8+67:2y79r+5hLECXcLpTmcXehxnYa
Checks for missing Authenticode signature.
resource |
---|
3ea909a94180a6d92a1532dbe6f7ec55_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetCurrentDirectoryA
DosDateTimeToFileTime
GetEnvironmentStrings
GetTempFileNameA
DeleteFileA
GetLastError
InitializeCriticalSection
GlobalFree
CreateFileA
GetTempPathA
FindNextFileA
FreeLibrary
GetCommandLineA
RaiseException
LocalFileTimeToFileTime
CreateProcessA
GlobalMemoryStatus
GetFileAttributesA
GetFileType
GetVersionExA
GetCurrentThreadId
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GetStartupInfoA
GetStdHandle
CreateDirectoryA
CloseHandle
EnterCriticalSection
CopyFileA
LoadLibraryA
LeaveCriticalSection
ExitProcess
GlobalUnlock
GetExitCodeProcess
GlobalLock
FindClose
GlobalAlloc
GetWindowsDirectoryA
GetDiskFreeSpaceA
FindFirstFileA
GetVersion
ReadFile
RemoveDirectoryA
RtlUnwind
SetConsoleCtrlHandler
SetFileAttributesA
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
WritePrivateProfileStringA
GetSystemDirectoryA
wsprintfA
UpdateWindow
TranslateMessage
ShowWindow
SetWindowLongA
SetTimer
SendMessageA
RegisterClassA
PostQuitMessage
MessageBoxA
LoadIconA
KillTimer
GetSystemMetrics
GetSysColorBrush
GetMessageA
GetDesktopWindow
GetClientRect
EnumThreadWindows
LoadCursorA
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
BeginPaint
SetWindowPos
TextOutA
SetTextAlign
SetBkMode
LZOpenFileA
LZCopy
LZClose
InitCommonControls
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
ExtractCabinet
ExtractFileEvent
ProgressEvent
SizeCabinetDescomp
__DebuggerHookData
__GetExceptDLLinfo
isRebootNeeded
userAbort
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ