@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
8e5b7f50c74143d7bfb6a11287abc2ce_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8e5b7f50c74143d7bfb6a11287abc2ce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
8e5b7f50c74143d7bfb6a11287abc2ce_JaffaCakes118
Size
6.4MB
MD5
8e5b7f50c74143d7bfb6a11287abc2ce
SHA1
e44cbe940438e7a5c4a2b7fa039d12b96d5e606f
SHA256
1ce01c0973b37ad03b6aa6a9746596531cd01f8eec33643b0e2ceb01e4a7ebf1
SHA512
ed111eda439e3f19e9d7e4cba66bcae73c6eadda77daa006f6de1e8469b6c53a26b9b2fd4e4666c7e7f095f80ec71cb4ca8d134887826962090e7ad600f96c02
SSDEEP
98304:Gpy43WDEI8CYMQk2wOsbGvfkdeyUu8mJ2+ibiBAES5H+daiCb7MtbZgYWQ:KyXEccwBhYcJ2gCr5iiUv
Checks for missing Authenticode signature.
resource |
---|
8e5b7f50c74143d7bfb6a11287abc2ce_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CreateFileA
CreateProcessA
CreateThread
EnterCriticalSection
ExitProcess
ExitThread
FindResourceA
FormatMessageA
GetACP
GetCPInfo
GetCommandLineA
GetComputerNameA
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTime
GetTempPathA
GetVersion
GetVersionExA
GetVolumeInformationA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LoadResource
LocalAlloc
LocalFree
LocalSize
MultiByteToWideChar
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetThreadPriority
SizeofResource
Sleep
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
lstrcatA
lstrlenA
InitCommonControls
BeginPath
BitBlt
CombineRgn
CreateCompatibleBitmap
CreateCompatibleDC
CreateEllipticRgn
CreateFontA
CreatePolygonRgn
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
EndPath
FrameRgn
GetDIBits
PathToRegion
Polygon
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
SetDIBits
SetPixelV
TextOutA
BeginPaint
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EndPaint
EnumThreadWindows
FindWindowA
GetDC
GetMessageA
GetSystemMetrics
InvalidateRect
LoadBitmapA
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendMessageA
SetForegroundWindow
SetWindowRgn
ShowWindow
TranslateMessage
UpdateWindow
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ