@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DDECallback
FileHook
MainWndProc
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
946bcf2a67ba8560bddabb0c7d0d93e6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
946bcf2a67ba8560bddabb0c7d0d93e6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
946bcf2a67ba8560bddabb0c7d0d93e6_JaffaCakes118
Size
76KB
MD5
946bcf2a67ba8560bddabb0c7d0d93e6
SHA1
47c4cfe55dbb5ac5e1ef62cedb05dd303564bb1f
SHA256
c30715f73b7c88dea0bb90bfa983cc3d9940dc00e968478099a68bb4f9d7092d
SHA512
5698c9fd03466f8d4a7763dfddf0a62030b6ba58c0aa93f80ef68d2528cccdb43509adb8e289a40c282bbe3dee40e521ddae2da3c4dca627bd28ecb3e5decf2a
SSDEEP
1536:9F41v5rOJsWXo7zHUHku4oPQUqbDGcGFe/d4qoYdQPjE:9F41v5rHHUHR4oHe/d4qoQQ
Checks for missing Authenticode signature.
resource |
---|
946bcf2a67ba8560bddabb0c7d0d93e6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CloseHandle
CreateFileA
DeleteFileA
EnterCriticalSection
ExitProcess
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetErrorMode
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WinExec
WriteFile
WritePrivateProfileStringA
GetOpenFileNameA
GetStockObject
BeginPaint
BringWindowToTop
CheckDlgButton
CreateWindowExA
DdeAccessData
DdeClientTransaction
DdeConnect
DdeCreateDataHandle
DdeCreateStringHandleA
DdeDisconnect
DdeFreeDataHandle
DdeFreeStringHandle
DdeInitializeA
DdeUnaccessData
DdeUninitialize
DefWindowProcA
DestroyIcon
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawIcon
EndDialog
EndPaint
EnumThreadWindows
FindWindowA
GetDesktopWindow
GetDlgItem
GetMessageA
GetWindowRect
IsDlgButtonChecked
LoadCursorA
LoadIconA
MessageBeep
MessageBoxA
PostMessageA
PostQuitMessage
RegisterClassA
SendDlgItemMessageA
SetFocus
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UnregisterClassA
UpdateWindow
wsprintfA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DDECallback
FileHook
MainWndProc
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE