__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
60c5cd65969c8fe71092bb3fd6b47941_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
60c5cd65969c8fe71092bb3fd6b47941_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
60c5cd65969c8fe71092bb3fd6b47941_JaffaCakes118
Size
200KB
MD5
60c5cd65969c8fe71092bb3fd6b47941
SHA1
6078b37cb60988eaf2fcf2b8352b7c3fcff3859d
SHA256
4453f89150345316000e7ec7ca45fcfeab6dec30d68b8dce3ec18d001660ba80
SHA512
79e89c5fb1a9d3dc02649c95f729ccbb9db8dacc1bce3f2b28851ceef4845003d07dc8dd3c19c7f1d384b8051cebbc2bec4c82c410fd287877373e30cfd1c2e1
SSDEEP
3072:hHH/El8aVZw3xiBvybyKL28+A6Jfl88pI8VDI+FvKMbMo1VumpB:JEl8eZwaq+KyBJdLp1r4o1VumL
Checks for missing Authenticode signature.
resource |
---|
60c5cd65969c8fe71092bb3fd6b47941_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
_memset
_malloc
_strcat
__ExceptionHandler
_abort
_strstr
_strlen
_strncpy
@_CatchCleanup$qv
_memcpy
__startup
_strncmp
_atol
@__unlockDebuggerData$qv
_strcmp
_flushall
_memcmp
@__lockDebuggerData$qv
___debuggerDisableTerminateCallback
_strcpy
__ftol
_free
GetSystemDirectoryA
CompareFileTime
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetSystemDefaultLangID
CopyFileA
GetVersionExA
GetModuleFileNameA
GetLocalTime
GetFileTime
GetFileAttributesA
FreeLibrary
GetCurrentProcess
DeleteFileA
CreateProcessA
WriteFile
UnmapViewOfFile
CreateFileMappingA
ReadFile
MapViewOfFile
CreateFileA
LoadLibraryA
CloseHandle
RegDeleteValueA
OpenProcessToken
RegSetValueExA
RegDeleteKeyA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
RegEnumKeyA
SelectObject
GetTextExtentPointA
GetStockObject
DeleteObject
DeleteDC
CreateFontA
CreateCompatibleDC
BitBlt
BeginPaint
AppendMenuA
wsprintfA
UpdateWindow
ShowWindow
SetTimer
SetDlgItemTextA
SendDlgItemMessageA
ReleaseDC
RegisterClassA
ModifyMenuA
MessageBoxA
MessageBeep
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
GetMessageA
GetMenu
PostQuitMessage
GetDlgItemTextA
GetDC
GetClientRect
SendMessageA
FindWindowA
ExitWindowsEx
EndPaint
TranslateMessage
EndDialog
EnableMenuItem
DispatchMessageA
DialogBoxParamA
DeleteMenu
DefWindowProcA
CreateWindowExA
CheckMenuItem
Netbios
Shell_NotifyIconA
socket
sendto
recvfrom
inet_ntoa
inet_addr
htons
gethostname
gethostbyname
closesocket
bind
WSAStartup
WSACleanup
WSAAsyncSelect
InitCommonControls
CreateStatusWindowA
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE