@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
0b6a668592e3f02a3821f774d79f64c3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0b6a668592e3f02a3821f774d79f64c3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
0b6a668592e3f02a3821f774d79f64c3_JaffaCakes118
Size
61KB
MD5
0b6a668592e3f02a3821f774d79f64c3
SHA1
b470e1968c25fdba7f8fc1beb8c0a8ad8080e821
SHA256
66277ad4d8d3b19b3090d52d0feb0afeae2d80a846688bfe0958f5bcd7023265
SHA512
bfa18bf6a12f17ef30950b1cb05a5a76e5304db604e6629d856f150a1577b769c32426947b23d716ae250587f3c5bc6b19c856f06e7d4dbb58e3cbe0fece50fa
SSDEEP
768:CXhfd4sAJp6IXB8YCcpeSUR7pBfzhS9MOQvWGwdBOtpJ1QGkGNPDBLxCuY6NTH:gmJEK8YCeeSUhdS9AvdwdcQGkGDFp9
Checks for missing Authenticode signature.
resource |
---|
0b6a668592e3f02a3821f774d79f64c3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CloseHandle
CreateDirectoryA
CreateFileA
CreateThread
EnterCriticalSection
ExitProcess
ExitThread
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
RemoveDirectoryA
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForMultipleObjects
WideCharToMultiByte
WriteFile
lstrcatA
lstrcpyA
lstrlenA
EnumThreadWindows
MessageBoxA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ