__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
143a62a644276e276641e22292e85f49_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
143a62a644276e276641e22292e85f49_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
143a62a644276e276641e22292e85f49_JaffaCakes118
Size
77KB
MD5
143a62a644276e276641e22292e85f49
SHA1
68bddb01f85a1c0569cea03cf8f8d37ea8961214
SHA256
e721641fe513a15dc7ef326b087859e9eea60c1f5cb3c8fafc0642aaf5f56dab
SHA512
74b91132d9e569d3829ad9920e54db3a415e97fb39a8865d3a67e99128e05d0b2f7ea10f365e545329fc60c5fa9c8511c7126875213bb10ad6889662fdbd9e0c
SSDEEP
1536:SvihyhA0pzTBG1UghzKHSEqD8j5cdNNTG8GZJOjYieulQH9TiIolvSbGcmZgR:SvNFpWF5KE81cXqEj9AofZgR
Checks for missing Authenticode signature.
resource |
---|
143a62a644276e276641e22292e85f49_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CopyFileW
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
lstrcmpA
CreateDialogParamA
CreateDialogParamW
DdeCreateStringHandleW
DdeEnableCallback
DdeNameService
DefWindowProcA
DestroyWindow
DrawFocusRect
DrawTextExA
EnumThreadWindows
ExitWindowsEx
GetForegroundWindow
GetLastActivePopup
GetMenuDefaultItem
GetMenuStringA
GetMessageA
GetTabbedTextExtentA
IsCharUpperA
IsWindow
MessageBoxA
OpenIcon
PostThreadMessageA
SendDlgItemMessageA
SetMenuDefaultItem
SetTimer
SetWindowContextHelpId
SetWindowPos
ShowOwnedPopups
TileWindows
UnhookWindowsHook
WaitMessage
WindowFromDC
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ