@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
69ee3799ab967f1ab02953b20b5113fa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
69ee3799ab967f1ab02953b20b5113fa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
69ee3799ab967f1ab02953b20b5113fa_JaffaCakes118
Size
743KB
MD5
69ee3799ab967f1ab02953b20b5113fa
SHA1
d6dcf3f1d55ec0bb6600121fe23ab97611b4ea4a
SHA256
b09bf0f7cd2599c8cf3ae7a284c0a7aaa97eb37a38cdff59dfa90520604e8cb7
SHA512
e44626362f2835eec0ca6e0e2a5e72eefc613267480d8a1f76479e6aacfcf9a17d10a4760ff12b972446419d8e3ebe3a9dbc68c94e89ae688dcf7023deb518ba
SSDEEP
12288:e2LPqmYg8AyZHvFQBtLumXdAPzirzFK8vL4LefjIgWjpXI:e2rqmr8fZNSLumbPFKvL1gK2
Checks for missing Authenticode signature.
resource |
---|
69ee3799ab967f1ab02953b20b5113fa_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetFileAttributesA
RaiseException
GetVersion
GetModuleHandleA
SetConsoleCtrlHandler
GetStdHandle
InitializeCriticalSection
UnhandledExceptionFilter
GetStartupInfoA
VirtualAlloc
SetHandleCount
GetProcAddress
RtlUnwind
GetLastError
ExitProcess
LeaveCriticalSection
GetFileType
GlobalMemoryStatus
GetCommandLineA
CloseHandle
WriteFile
VirtualFree
GetCurrentThreadId
EnterCriticalSection
GetModuleFileNameA
SetFilePointer
GetEnvironmentStrings
GetLocalTime
CreateFileA
CreateCompatibleDC
BitBlt
SelectObject
GetStockObject
GetPixel
GetNearestColor
GetDeviceCaps
DeleteObject
SetPixel
DeleteDC
UpdateWindow
ShowWindow
SetTimer
ReleaseDC
PostQuitMessage
MessageBoxA
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
InvalidateRect
GetMessageA
GetDC
EnumThreadWindows
RegisterClassA
EndPaint
DispatchMessageA
DefWindowProcA
TranslateMessage
CreateWindowExA
BeginPaint
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ