__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
IRXP.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
IRXP.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
irxp.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
irxp.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
IRXPZRTL.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
IRXPZRTL.exe
Resource
win10v2004-20240802-en
Target
08e8c345cdfbd3f711d48a05236b250c_JaffaCakes118
Size
76KB
MD5
08e8c345cdfbd3f711d48a05236b250c
SHA1
78d4620f7911d31034c40bfa7a860800df346b67
SHA256
bac6aeeb8cf4c86332e0fed8c7d39f215f3e3177580c201577f5aa54dd1e062f
SHA512
dc217e4a5aeb9721490ddbcbef95d48b09430ce03f80ba02fa5fbf9abf0db07b9397b7c78fd6bfeb5d2ff732524bf8c7fc1bcf71fdce1b547d25eaa38d8f17c1
SSDEEP
1536:lEk2GhcdC7LglmRpGDXewDNLUjtSC1AhL/oSFWC8JURUABx:bhcdC7slwnqUZnWURC8JU2AL
Checks for missing Authenticode signature.
resource |
---|
unpack001/IRXP.EXE |
unpack001/IRXPZRTL.EXE |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateEventA
CreateFileA
CreateThread
DeleteFileA
EnterCriticalSection
ExitProcess
ExitThread
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTickCount
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LCMapStringA
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
OpenEventA
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetEvent
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
WSACleanup
WSAGetLastError
WSAStartup
__WSAFDIsSet
accept
closesocket
connect
gethostbyname
gethostname
getsockname
htons
ioctlsocket
inet_addr
inet_ntoa
listen
ntohl
ntohs
recv
select
send
setsockopt
socket
bind
EnumThreadWindows
MessageBoxA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE