__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
bcfa40ffde64986dae8a425982477259_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bcfa40ffde64986dae8a425982477259_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
bcfa40ffde64986dae8a425982477259_JaffaCakes118
Size
289KB
MD5
bcfa40ffde64986dae8a425982477259
SHA1
ed4312a6fd92bc95ce5a5010c3d431765dbab37b
SHA256
7c05b6e430a22f2ba39c77e34a06b728ccb5b063dc6404b52cca5143565ffc02
SHA512
d2e30cac13f87897026b0fd8bf932aa7fbd62b73e2c087d59551491bbe0aefd31bafb536e54efbc02bde7f495d578d9039b4eeb3085ce0bd5feae5aa960f0a8d
SSDEEP
6144:wmfsWKxsH6+vlbR0SnHm7sXDE884xh1RVUJulUiO4Lib2P8LhY4exeXzJr:jY+v1R0SHm7KDSQNftOSZP8LhtrDJr
Checks for missing Authenticode signature.
resource |
---|
bcfa40ffde64986dae8a425982477259_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateFileA
DeleteFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTempPathA
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WinExec
WriteFile
EnumThreadWindows
MessageBoxA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ