__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
d32774f015be8b00018fefe09d4850bd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d32774f015be8b00018fefe09d4850bd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d32774f015be8b00018fefe09d4850bd_JaffaCakes118
Size
66KB
MD5
d32774f015be8b00018fefe09d4850bd
SHA1
4e4ebbf95e4a171ea6640f50154eac50790377bb
SHA256
6f27d70422b86f426ee47336b9077a8dba72b39617fb1e8fa092110e492327dc
SHA512
f11f6247c092d8b6923dd11462c79b9cdcbc57c4f7257f20b90e296fe9fc00cbfc9ab50a573cb5a22332e492f7be9a586eb1ecb3a820cc328e0588938aafa34b
SSDEEP
1536:D2p4tWO3bQKFGsJW5eL+1dby5/7GEGcE8K7tj:CwWA8R5eB/FE8K7l
Checks for missing Authenticode signature.
resource |
---|
d32774f015be8b00018fefe09d4850bd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegCloseKey
RegOpenKeyExA
RegSetValueExA
CloseHandle
CreateDirectoryA
CreateFileA
CreateFileW
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetFileAttributesA
GetFileAttributesW
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemDefaultLangID
GetVersion
GetVersionExA
GetVolumeInformationA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LCMapStringA
LeaveCriticalSection
LoadLibraryA
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WriteFile
lstrlenA
CloseWindow
EnumThreadWindows
FindWindowA
MessageBoxA
SetWindowTextA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ