__GetExceptDLLinfo
___CPPdebugHook
Overview
overview
5Static
static
51000 Hacki...61.vbs
windows7-x64
11000 Hacki...61.vbs
windows10-2004-x64
11000 Hacki...es.ps1
windows7-x64
31000 Hacki...es.ps1
windows10-2004-x64
31000 Hacki...on.rtf
windows7-x64
41000 Hacki...on.rtf
windows10-2004-x64
11000 Hacki... !.rtf
windows7-x64
41000 Hacki... !.rtf
windows10-2004-x64
11000 Hacki...rs.rtf
windows7-x64
41000 Hacki...rs.rtf
windows10-2004-x64
11000 Hacki...ds.htm
windows7-x64
11000 Hacki...ds.htm
windows10-2004-x64
11000 Hacki.... .doc
windows7-x64
41000 Hacki.... .doc
windows10-2004-x64
11000 Hacki...de.htm
windows7-x64
11000 Hacki...de.htm
windows10-2004-x64
11000 Hacki...ed.vbs
windows7-x64
11000 Hacki...ed.vbs
windows10-2004-x64
11000 Hacki...Up.htm
windows7-x64
11000 Hacki...Up.htm
windows10-2004-x64
11000 Hacki...am.htm
windows7-x64
11000 Hacki...am.htm
windows10-2004-x64
11000 Hacki...ew.rtf
windows7-x64
41000 Hacki...ew.rtf
windows10-2004-x64
11000 Hacki...DE.rtf
windows7-x64
41000 Hacki...DE.rtf
windows10-2004-x64
11000 Hacki...or.vbs
windows7-x64
11000 Hacki...or.vbs
windows10-2004-x64
11000 Hacki...to.rtf
windows7-x64
41000 Hacki...to.rtf
windows10-2004-x64
11000 Hacki...b7.doc
windows7-x64
41000 Hacki...b7.doc
windows10-2004-x64
1Behavioral task
behavioral1
Sample
1000 Hacking Tutorials/Anarchist Cookbook 2004/061.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1000 Hacking Tutorials/Anarchist Cookbook 2004/061.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
1000 Hacking Tutorials/Backtracking EMAIL Messages.ps1
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
1000 Hacking Tutorials/Backtracking EMAIL Messages.ps1
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
1000 Hacking Tutorials/Change Text on XP Start Button.rtf
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
1000 Hacking Tutorials/Change Text on XP Start Button.rtf
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
1000 Hacking Tutorials/Creating a Board aka Forum on your own PC !.rtf
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
1000 Hacking Tutorials/Creating a Board aka Forum on your own PC !.rtf
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
1000 Hacking Tutorials/Do you want 500 dollars.rtf
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
1000 Hacking Tutorials/Do you want 500 dollars.rtf
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
1000 Hacking Tutorials/More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands.htm
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
1000 Hacking Tutorials/More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
1000 Hacking Tutorials/More Hacking/NY_2'S Guide to Obtaining An IP Address. .doc
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
1000 Hacking Tutorials/More Hacking/NY_2'S Guide to Obtaining An IP Address. .doc
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
1000 Hacking Tutorials/More Hacking/PGP Startup Guide.htm
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
1000 Hacking Tutorials/More Hacking/PGP Startup Guide.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
1000 Hacking Tutorials/More Hacking/Telenet-The Secret Exposed.vbs
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
1000 Hacking Tutorials/More Hacking/Telenet-The Secret Exposed.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
1000 Hacking Tutorials/More Hacking/UNIX Use and Security From The Ground Up.htm
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
1000 Hacking Tutorials/More Hacking/UNIX Use and Security From The Ground Up.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
1000 Hacking Tutorials/More Hacking/What To Look For In A Code Hacking Program.htm
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
1000 Hacking Tutorials/More Hacking/What To Look For In A Code Hacking Program.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
1000 Hacking Tutorials/New Hacking Ebooks/A Basic UNIX Overview.rtf
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
1000 Hacking Tutorials/New Hacking Ebooks/A Basic UNIX Overview.rtf
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
1000 Hacking Tutorials/New Hacking Ebooks/Anonymity complete GUIDE.rtf
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
1000 Hacking Tutorials/New Hacking Ebooks/Anonymity complete GUIDE.rtf
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
1000 Hacking Tutorials/New Hacking Ebooks/Backdoor.vbs
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
1000 Hacking Tutorials/New Hacking Ebooks/Backdoor.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
1000 Hacking Tutorials/New Hacking Ebooks/Firewall Protection how to.rtf
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
1000 Hacking Tutorials/New Hacking Ebooks/Firewall Protection how to.rtf
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
1000 Hacking Tutorials/New Hacking Ebooks/Guide to Hacking with sub7.doc
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
1000 Hacking Tutorials/New Hacking Ebooks/Guide to Hacking with sub7.doc
Resource
win10v2004-20240709-en
Target
5dbd0dead228bda1b56a5050f57aee7d_JaffaCakes118
Size
6.5MB
MD5
5dbd0dead228bda1b56a5050f57aee7d
SHA1
754b05f78b64a1a2262dd05f270267cb87ea3ebf
SHA256
a3e7648fbc0e871cdd93c55b7d1486712bfa2d59c1ed11da1f0f8955faf40bf7
SHA512
dd0b96a59c2af9756e652251f285accd8ea9945dd86ffe93a7817721fe2b6c1259f0ca2bc5bb8b194f6464c9657e27f252172d86789baf0e542236ef1ff68ea3
SSDEEP
98304:+KbMjxP0QG/hPIggsmMBf0eW00UYsYHDWlKG/7M+HQ0TGaNHwoTgJRKx:+Rjxsz/VTgsCwjUmKGI+wQGR4QKx
A PDF can contain malformed data to evade detection
Checks for missing Authenticode signature.
resource |
---|
unpack005/section_1_2/section_1_2.exe |
unpack006/section_1_3/section_1_3.exe |
unpack007/section_1_4/section_1_4.exe |
unpack008/section_1_5_1/section_1_5_1.exe |
unpack009/section_1_5_2/section_1_5_2.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
EnumThreadWindows
MessageBoxA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EnumThreadWindows
GetMessageA
LoadCursorA
LoadIconA
MessageBoxA
PostQuitMessage
RegisterClassExA
ShowWindow
TranslateMessage
UpdateWindow
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
TextOutA
BeginPaint
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EndPaint
EnumThreadWindows
GetMessageA
LoadCursorA
LoadIconA
MessageBoxA
PostQuitMessage
RegisterClassExA
ShowWindow
TranslateMessage
UpdateWindow
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EnumThreadWindows
GetMessageA
LoadCursorA
LoadIconA
MessageBoxA
PostQuitMessage
RegisterClassExA
ShowWindow
TranslateMessage
UpdateWindow
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
AppendMenuA
CreateMenu
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EnumThreadWindows
GetMessageA
LoadCursorA
LoadIconA
MessageBoxA
PostQuitMessage
RegisterClassExA
SetMenu
ShowWindow
TranslateMessage
UpdateWindow
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ