DoMyJob
GetPTPluginName
LoadDll
StartPTPlugin
Overview
overview
3Static
static
3PEiD.exe
windows7-x64
3PEiD.exe
windows10-2004-x64
3PEiD_ch.exe
windows7-x64
3PEiD_ch.exe
windows10-2004-x64
3plugins/AddSig.dll
windows7-x64
3plugins/AddSig.dll
windows10-2004-x64
3plugins/AddSig.html
windows7-x64
3plugins/AddSig.html
windows10-2004-x64
3plugins/ad...an.dll
windows7-x64
3plugins/ad...an.dll
windows10-2004-x64
3plugins/kanal.htm
windows7-x64
3plugins/kanal.htm
windows10-2004-x64
3tools/PEiD...SO.exe
windows7-x64
3tools/PEiD...SO.exe
windows10-2004-x64
3tools/PEid...er.exe
windows7-x64
3tools/PEid...er.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
PEiD.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
PEiD.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PEiD_ch.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
PEiD_ch.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
plugins/AddSig.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
plugins/AddSig.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
plugins/AddSig.html
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
plugins/AddSig.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
plugins/advanced_scan.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
plugins/advanced_scan.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
plugins/kanal.htm
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
plugins/kanal.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
tools/PEiD Signature Organizer/PEIDSO.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
tools/PEiD Signature Organizer/PEIDSO.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
tools/PEid_db_Manager_1.01/PEid db Manager.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
tools/PEid_db_Manager_1.01/PEid db Manager.exe
Resource
win10v2004-20240802-en
Target
b84ea6312029541ea0291513d2a3779c_JaffaCakes118
Size
800KB
MD5
b84ea6312029541ea0291513d2a3779c
SHA1
c11918e5648a182049b39c5e9e60b01ac9c86f3b
SHA256
5b5f215c87a3e41c7c67a6b3545e7444164cd8385f852b01b9792fdef3ffd153
SHA512
2401c73e310ad7e17243c8c92b02c80b8faeb2226c21d3ca0bae0d1326c0c5d2e2c4f4a45a2bf16e7ab88e06dc478cbe9c1cd40246aee508945ab9e4fd727a4b
SSDEEP
12288:IIV6moOmxUdd0SSxXOpb2ecgg9bWgUCoev6ptp8HOK6sZOh4YSSOlxxu/t:PsxUC+pbNngAXzptp+OK6RSwt
Checks for missing Authenticode signature.
resource |
---|
unpack001/PEiD.exe |
unpack001/PEiD_ch.exe |
unpack001/plugins/AddSig.DLL |
unpack001/plugins/advanced_scan.dll |
unpack001/tools/PEiD Signature Organizer/PEIDSO.exe |
unpack001/tools/PEid_db_Manager_1.01/PEid db Manager.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
EqualSid
CreateToolbarEx
ImageList_Destroy
ImageList_Create
ImageList_ReplaceIcon
InitCommonControls
GetTextMetricsA
CreateCompatibleDC
SelectObject
CreateSolidBrush
TextOutA
BitBlt
SetTextColor
SetBkMode
GetStockObject
CreateFontIndirectA
DeleteObject
CreateCompatibleBitmap
DeleteDC
Sleep
GlobalLock
lstrcpy
OutputDebugStringA
GetProcAddress
LoadLibraryA
FreeLibrary
CompareStringA
lstrlen
GlobalUnlock
WritePrivateProfileStructA
GetModuleHandleA
lstrcat
lstrcpyn
GetPrivateProfileStructA
ReadFile
SetFilePointer
SetEndOfFile
MultiByteToWideChar
WideCharToMultiByte
FlushFileBuffers
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
CreateThread
VirtualProtect
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
IsBadCodePtr
IsBadReadPtr
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileType
LockResource
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
HeapSize
ExitProcess
VirtualQuery
InterlockedExchange
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetLastError
TlsAlloc
HeapAlloc
HeapReAlloc
HeapFree
GetVersionExA
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
FindFirstFileA
FindNextFileA
GetTickCount
FindClose
GlobalAlloc
ReadProcessMemory
GetTempPathA
GlobalFree
MulDiv
GetModuleFileNameA
GetCurrentThread
GetLastError
GetCurrentProcess
OpenProcess
TerminateProcess
WaitForSingleObject
TerminateThread
GetFileAttributesA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateFileA
CloseHandle
WriteFile
GetSystemInfo
Shell_NotifyIcon
DragFinish
DragQueryFile
ShellExecuteA
DragAcceptFiles
SHBrowseForFolder
SHGetPathFromIDList
SHGetFileInfo
GetClientRect
ScreenToClient
LoadBitmapA
LoadAcceleratorsA
GetMessageA
TranslateAccelerator
wsprintfA
DispatchMessageA
DefWindowProcA
CheckRadioButton
GetScrollInfo
IsClipboardFormatAvailable
GetClipboardData
GetWindowTextLengthA
CreateWindowExA
GetSystemMetrics
RegisterClassA
GetParent
GetDlgCtrlID
GetClassInfoA
EnumClipboardFormats
TranslateMessage
CheckDlgButton
SetFocus
GetScrollPos
SetScrollPos
SetScrollRange
GetClassLongA
SetCaretPos
ShowCaret
HideCaret
DestroyCaret
RegisterClipboardFormatA
AppendMenuA
GetAsyncKeyState
IsZoomed
IsIconic
PostQuitMessage
IsWindowEnabled
MessageBoxIndirectA
wvsprintfA
InvalidateRect
GetDC
ReleaseDC
BeginPaint
FillRect
EndPaint
UpdateWindow
DestroyMenu
FindWindowA
SetForegroundWindow
SetWindowPos
TrackPopupMenu
PostMessageA
SetWindowLongA
ShowWindow
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
DialogBoxParamA
GetCursorPos
TrackPopupMenuEx
LoadIconA
CreatePopupMenu
InsertMenuA
GetDlgItemTextA
IsDlgButtonChecked
CallWindowProcA
MessageBeep
GetSysColorBrush
SetDlgItemTextA
LoadCursorA
SetClassLongA
EndDialog
EnableWindow
SetWindowTextA
SendDlgItemMessageA
SendMessageA
MessageBoxA
MoveWindow
GetDlgItem
GetWindowRect
CreateCaret
GetOpenFileNameA
GetSaveFileNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
SysFreeString
VerQueryValueA
UnrealizeObject
CoTaskMemAlloc
ImageList_SetIconSize
GetOpenFileNameA
DoMyJob
GetPTPluginName
LoadDll
StartPTPlugin
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MoveWindow
SendMessageA
SetWindowTextA
GetDlgItem
EndDialog
DialogBoxParamA
wsprintfA
FindClose
GetPrivateProfileSectionNamesA
lstrlenA
lstrcpyA
lstrcatA
CloseHandle
CompareStringA
CreateFileA
CreateFileMappingA
CreateThread
GetFileAttributesA
GetFileSize
GetModuleFileNameA
FindFirstFileA
MapViewOfFile
RtlMoveMemory
UnmapViewOfFile
VirtualAlloc
VirtualFree
DragFinish
DragQueryFileA
CreateFontIndirectA
DoMyJob
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA