@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
b74669a16f9aaed287e541740cb22d7b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b74669a16f9aaed287e541740cb22d7b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b74669a16f9aaed287e541740cb22d7b_JaffaCakes118
Size
190KB
MD5
b74669a16f9aaed287e541740cb22d7b
SHA1
8f86bb815eb3e1848ee552b2becbeb07dbf044f7
SHA256
0c8c7f286c4842f2f413e8fa58445c1479fc60c38342496d93a5152d5a908d0a
SHA512
0282906fffafd930a0651952775ad479f5e07a67b2cff3b11ec76cb96be90a3fc17a5b4c85ebec00f212e0c15f6219e9f5efe9355481f61fcdacc0b47459a723
SSDEEP
768:PMY+xKlas3Tpx47cxU1Le/Ge2bQfoF9odBsDBrE5kGlsHyje+SBsrRjfdG6jLeWk:U5sjr47SkbQfoFCdYrEx6NBgGw
Checks for missing Authenticode signature.
resource |
---|
b74669a16f9aaed287e541740cb22d7b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
VirtualAlloc
CreateFileA
_lclose
VirtualFree
GetModuleHandleA
GetEnvironmentStrings
_lwrite
_lread
WriteFile
WinExec
GetStartupInfoA
FileTimeToDosDateTime
DeleteFileA
UnhandledExceptionFilter
GetLastError
SetEnvironmentVariableA
ExitProcess
GetModuleFileNameA
GetVersion
LeaveCriticalSection
FindClose
GetVolumeInformationA
GetSystemDirectoryA
FileTimeToLocalFileTime
GetProcAddress
GetFileAttributesA
GetFileSize
GetFileType
GetFullPathNameA
GetCurrentProcess
GetLocalTime
EnterCriticalSection
SetHandleCount
SetFilePointer
GetCurrentDirectoryA
ReadFile
SetConsoleCtrlHandler
SetCurrentDirectoryA
OpenFile
FindNextFileA
GetCommandLineA
MoveFileA
RaiseException
InitializeCriticalSection
GlobalMemoryStatus
FindFirstFileA
CloseHandle
RtlUnwind
GetCurrentThreadId
GetStdHandle
RegCloseKey
CreateServiceA
LookupPrivilegeValueA
SetServiceStatus
OpenProcessToken
RegisterServiceCtrlHandlerA
RegSetValueExA
CloseServiceHandle
RegCreateKeyA
AdjustTokenPrivileges
OpenSCManagerA
TextOutA
GetStockObject
DeleteObject
CreateFontIndirectA
TranslateMessage
ShowWindow
SetWindowPos
SetDlgItemTextA
SetDlgItemInt
SendMessageA
ReleaseDC
RegisterClassA
PostThreadMessageA
MessageBoxA
LoadCursorA
KillTimer
GetWindowRect
GetDlgItemTextA
GetDlgItemInt
GetDesktopWindow
GetDC
FillRect
EnumThreadWindows
EndPaint
EndDialog
DispatchMessageA
DialogBoxParamA
DefWindowProcA
GetMessageA
CreateWindowExA
BeginPaint
SetTimer
MessageBeep
WSACleanup
WSAAsyncSelect
socket
send
recv
inet_addr
htons
gethostbyname
connect
closesocket
WSAStartup
WSAGetLastError
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE