__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
0f2d61164e0a4be8632e15500cf24e23_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0f2d61164e0a4be8632e15500cf24e23_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
0f2d61164e0a4be8632e15500cf24e23_JaffaCakes118
Size
124KB
MD5
0f2d61164e0a4be8632e15500cf24e23
SHA1
ca550dd86710a18758ccabfa7d92342d88945cc8
SHA256
60a3e9fa30d76696f9d2fa01178556d279c70ce6ab128d1e1e7c87db758ce44c
SHA512
e67c87fff988451e4d527ee523f847da154c845eb41eb94cc8a0957eaa0dc07510d8befe36517806210f1c70fa99d5fe23ea25c768da45d115fe99aebdb47078
SSDEEP
3072:jg6ke0I42X45ctIWyV4B4MSAKzL3J3cFjyHbkbZB1R5yH:86kq42oSWh+qxtP3iFe7YZTo
Checks for missing Authenticode signature.
resource |
---|
0f2d61164e0a4be8632e15500cf24e23_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
lstrcmpA
lstrcmpW
AppendMenuA
BeginDeferWindowPos
CharNextA
CharUpperBuffW
CopyIcon
CreateCaret
CreateDialogIndirectParamW
DdeGetLastError
DispatchMessageA
DrawStateW
EnumChildWindows
EnumThreadWindows
EnumWindowStationsA
GetDlgItemTextW
GetInputState
GetKeyboardLayoutNameW
GetMenuStringW
GetTabbedTextExtentW
GetUpdateRgn
GetUserObjectSecurity
GetWindowInfo
InsertMenuW
IsCharAlphaNumericA
IsWindowUnicode
IsWindowVisible
MapDialogRect
MessageBoxA
OpenIcon
RegisterHotKey
RemovePropW
SetFocus
SetRect
SetWindowsHookA
ToAsciiEx
WinHelpW
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ