__GetExceptDLLinfo
___CPPdebugHook
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
dbe20b0025b73769811b5416ecf7177f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbe20b0025b73769811b5416ecf7177f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
dbe20b0025b73769811b5416ecf7177f_JaffaCakes118
Size
253KB
MD5
dbe20b0025b73769811b5416ecf7177f
SHA1
81d57a04d6833a9592f1966f2c6f773d2dd863e0
SHA256
84fe55896f3854f33b088f2351616ad92699735fa5ca2f22a58cc071e88c7c62
SHA512
14847f31e2464db0db14a2832898bffd5d7e6a0ab8f5061fe0433ac0234fe6924b434a3dabe0d479c5700723255bcd0f8c3bfde55f74240bda969d8250a0ae63
SSDEEP
6144:6jYD4PawAJ1U4CDU3nh9wv1U5K0pxSOODQZM/2zlmUJm:6Za/y4h9wt0K0THO0Z82hLY
Checks for missing Authenticode signature.
resource |
---|
dbe20b0025b73769811b5416ecf7177f_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.