@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
8cca292198f2b4c1b646d048e326b193_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8cca292198f2b4c1b646d048e326b193_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
8cca292198f2b4c1b646d048e326b193_JaffaCakes118
Size
64KB
MD5
8cca292198f2b4c1b646d048e326b193
SHA1
c201b73ebbe65ea8a9df6518195193988e8a2686
SHA256
f6434c58e1bb6bf94a8806f7b280a25ebe667990cf7fc94f89508571a956ccb3
SHA512
85ac61669e94f1a7ef212380f1b8974d4975fd27be235259b12711309f771360d53584ebdf23e82875101c8bb4988f8e8d45e6fbfb760fd2bc1f9ee153ab65bd
SSDEEP
1536:yg7jmDJdFWy1U1NrUhqdVx+VCDyGMGMiUC:VjH1xUhqdVbCiUC
Checks for missing Authenticode signature.
resource |
---|
8cca292198f2b4c1b646d048e326b193_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
CloseHandle
CreateFileA
CreateFileW
DeleteFileA
DeleteFileW
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStrings
GetFileAttributesA
GetFileAttributesW
GetFileTime
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetSystemTime
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFileTimeToFileTime
LocalFree
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetFileTime
SetHandleCount
SetPriorityClass
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WinExec
WriteFile
lstrcatA
lstrcpyA
lstrlenA
WSACleanup
WSAStartup
closesocket
connect
htons
inet_addr
recv
send
socket
EnumThreadWindows
FindWindowA
MessageBoxA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ