@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
7191c8911ca2ea874d5dc833d02f8b85_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7191c8911ca2ea874d5dc833d02f8b85_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
7191c8911ca2ea874d5dc833d02f8b85_JaffaCakes118
Size
6.7MB
MD5
7191c8911ca2ea874d5dc833d02f8b85
SHA1
ca7318c2fb248d6ccb28dc31365777359e586bae
SHA256
512e375d92c58861a87e5f1b8cf55157286cce5cc2b65829e3fe339de71f810f
SHA512
b7b2415ae36c42764c7b38b12f00c5334fdddd43c4d414b21e75791aacc4c846e18d9e9ec80de93e29084341a30860780ea48734236e35ea62045c5ba8a6408d
SSDEEP
98304:PaKFjD0AtgFD+K4iSnMa63A5K9uAzkcn+H5sF76eYf2/2+ibi7JQfMXBgHnZ2:C+0A5iSnM93A5K9VPnaEmeYk2gN5gH
Checks for missing Authenticode signature.
resource |
---|
7191c8911ca2ea874d5dc833d02f8b85_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CreateFileA
CreateProcessA
CreateThread
EnterCriticalSection
ExitProcess
ExitThread
FindResourceA
FormatMessageA
GetACP
GetCPInfo
GetCommandLineA
GetComputerNameA
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTime
GetTempPathA
GetVersion
GetVersionExA
GetVolumeInformationA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LoadResource
LocalAlloc
LocalFree
LocalSize
MultiByteToWideChar
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetThreadPriority
SizeofResource
Sleep
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
lstrcatA
lstrlenA
InitCommonControls
BeginPath
BitBlt
CombineRgn
CreateCompatibleBitmap
CreateCompatibleDC
CreateEllipticRgn
CreateFontA
CreatePolygonRgn
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
EndPath
FrameRgn
GetDIBits
PathToRegion
Polygon
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
SetDIBits
SetPixelV
TextOutA
BeginPaint
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EndPaint
EnumThreadWindows
FindWindowA
GetDC
GetMessageA
GetSystemMetrics
InvalidateRect
LoadBitmapA
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendMessageA
SetForegroundWindow
SetWindowRgn
ShowWindow
TranslateMessage
UpdateWindow
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ