__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
fe94514e780d2d9262a09aaca19e7393_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe94514e780d2d9262a09aaca19e7393_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fe94514e780d2d9262a09aaca19e7393_JaffaCakes118
Size
209KB
MD5
fe94514e780d2d9262a09aaca19e7393
SHA1
45d0703b40cc5160878acb9c9bbda02dadbe81af
SHA256
b8f96378355fb9fc2b9fd67b06baebf263be9b0513b145fc9aaef24e60939ab0
SHA512
ca38beb5bbf06e719c33afd993146e5a8889997939d4d176a44431beea1aa5705f844cf7b8054cc1fa39e6d211de6deeccd33fe8f919e3b9e67fab930b65e4a5
SSDEEP
6144:ZvhABxvvh6b5gSs182LDsA4xcljCdXYC4amf8ma3Vs:tE+cdCyINmks
Checks for missing Authenticode signature.
resource |
---|
fe94514e780d2d9262a09aaca19e7393_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
DeleteFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTempPathA
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WinExec
WriteFile
EnumThreadWindows
GetForegroundWindow
GetWindowTextA
MessageBoxA
SendMessageA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ