__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
PERVWCL.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PERVWCL.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
SAMPLES/SAMPLE1.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
SAMPLES/SAMPLE1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SAMPLES/SAMPLE2.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
SAMPLES/SAMPLE2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SRC/WCL/MAKE.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SRC/WCL/MAKE.bat
Resource
win10v2004-20240802-en
Target
f5321c0f6bbf10da5a6e78deefa7f845_JaffaCakes118
Size
41KB
MD5
f5321c0f6bbf10da5a6e78deefa7f845
SHA1
e53bb6908c6353de559e4416100da562c36b9f4c
SHA256
77a305b5c44fd6e7b4025a93a57d986bcc5acb748e018640fcf1d1f23b54f0a2
SHA512
4106fe2d9642c881be68299adfd19df232321626ca2894b6e1d22c0d47726f689d9cdc2abc9f15cc87ff7643064f760c60fffb4242d09324f0c9fe8a6f0e57cd
SSDEEP
768:AwMcJgxX+Mbza6fEUGe1BSX9MTe10HvxKtZ+zm4DF63GxGVtsAfdapGoTFkGEa5M:AAIVn4UGR30ZkZ+i/2YVldaT/Eai
Checks for missing Authenticode signature.
resource |
---|
unpack001/PERVWCL.EXE |
unpack001/SAMPLES/SAMPLE1.EXE |
unpack001/SAMPLES/SAMPLE2.EXE |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
DeleteFileA
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTickCount
GetVersion
GetVersionExA
GetVolumeInformationA
GlobalMemoryStatus
HeapAlloc
HeapFree
LCMapStringA
LoadLibraryA
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
EnumThreadWindows
MessageBoxA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
ExitProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
ExitProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ