__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
0e0776eeebc318ad799d2b4a34af8e7e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e0776eeebc318ad799d2b4a34af8e7e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
0e0776eeebc318ad799d2b4a34af8e7e_JaffaCakes118
Size
183KB
MD5
0e0776eeebc318ad799d2b4a34af8e7e
SHA1
293a3158fb97b9a231717d10eeca0f0b5804f9a2
SHA256
d6ea3abbc55c4358f92ae8fd542358602beed75772a4dbb600aa0da4e6ece8d4
SHA512
c7f62a399addf9b72abfaafa23e4564ac2928723dee642da01839ae6133bfcc9ffd3cade7468d52b2da307662fca9ae45ddbcb26980867d46eefeeb3000d32cc
SSDEEP
3072:CUsKdV1UpUqW3eKTj0gO+IgRpKT9BqAweeCT3JXEyyxxXOoZsDi6ZG:HsKHSKqOe6jJTRiBqAwePGysAoZf
Checks for missing Authenticode signature.
resource |
---|
0e0776eeebc318ad799d2b4a34af8e7e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CopyFileW
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
MultiByteToWideChar
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
lstrcmpA
AnimateWindow
CallMsgFilterA
CharToOemW
CheckMenuRadioItem
CloseDesktop
CreateIconFromResource
DdeAccessData
DdeFreeDataHandle
DrawIcon
DrawMenuBar
DrawTextExA
EnumChildWindows
EnumThreadWindows
EqualRect
FindWindowW
GetCapture
GetClassNameW
GetKeyboardLayoutNameA
GetMenuItemInfoA
GetPropA
GetSystemMetrics
GetUserObjectInformationW
GetWindowDC
IntersectRect
IsWindow
MessageBoxA
OpenDesktopW
ReuseDDElParam
SetCaretBlinkTime
SetClassLongW
SetCursor
SetKeyboardState
SetMessageQueue
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ