@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
43e2f621dafdad35aa32f5a7261040b2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
43e2f621dafdad35aa32f5a7261040b2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
43e2f621dafdad35aa32f5a7261040b2_JaffaCakes118
Size
3.9MB
MD5
43e2f621dafdad35aa32f5a7261040b2
SHA1
ac3040b47b58806d3cdb22033821a30af8a3e1f9
SHA256
cd0797318e5666110f43bcfc91478eeef5d88217b8ca91561838256cb8f047ad
SHA512
5e2bcc3cca3c80cec85eda078c6985250802dd6727331fc3fcda3ef313b45d83191448404da8cd7bd866045c197157fc2d52be06b67df057f17f9d4f57882dde
SSDEEP
49152:zXkhZd7ZjoXI5bY4IyvmqvQprIazN7b+v6L32n+UvTEGnlkiwk9esTXphHyVFQ1V:CZ1ZjoXIJY4inrI67h2+UbN+k9FTDTs
Checks for missing Authenticode signature.
resource |
---|
43e2f621dafdad35aa32f5a7261040b2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CreateFileA
CreateProcessA
CreateThread
EnterCriticalSection
ExitProcess
ExitThread
FindResourceA
FormatMessageA
GetACP
GetCPInfo
GetCommandLineA
GetComputerNameA
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTime
GetTempPathA
GetVersion
GetVersionExA
GetVolumeInformationA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LoadResource
LocalAlloc
LocalFree
LocalSize
MultiByteToWideChar
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetThreadPriority
SizeofResource
Sleep
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
lstrcatA
lstrlenA
InitCommonControls
BeginPath
BitBlt
CombineRgn
CreateCompatibleBitmap
CreateCompatibleDC
CreateEllipticRgn
CreateFontA
CreatePolygonRgn
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
EndPath
FrameRgn
GetDIBits
PathToRegion
Polygon
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
SetDIBits
SetPixelV
TextOutA
BeginPaint
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EndPaint
EnumThreadWindows
FindWindowA
GetDC
GetMessageA
GetSystemMetrics
InvalidateRect
LoadBitmapA
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendMessageA
SetForegroundWindow
SetWindowRgn
ShowWindow
TranslateMessage
UpdateWindow
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ