@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
3d0fc9c35fcae8c3fa02499649f52eae_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d0fc9c35fcae8c3fa02499649f52eae_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
3d0fc9c35fcae8c3fa02499649f52eae_JaffaCakes118
Size
99KB
MD5
3d0fc9c35fcae8c3fa02499649f52eae
SHA1
56a657e673180c74cbb49b5888ffe81d26091e15
SHA256
e521052c32da5a8498e8158da4e0a2a2a91868c1c31bebea44c0e1056be217d8
SHA512
374d6e870cb603b56946ed0df40172e6fb709e940a3a453f94f14670012c717873e1817acbb04de830f903894c8372552b2e5823bc746ae5138da9c9ae3374c8
SSDEEP
1536:kUVsOEEOBKCxz8tufsJvkRhVulAZeUgnHamBRyDcNvNhA7EGMGAcLBUZBv:vVsG4muflSAMUgn5jNbAscLGZ5
Checks for missing Authenticode signature.
resource |
---|
3d0fc9c35fcae8c3fa02499649f52eae_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
BeginUpdateResourceA
CloseHandle
CompareStringA
CopyFileA
CreateFileA
DeleteFileA
DeleteFileW
EndUpdateResourceA
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeLibrary
FreeResource
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetTickCount
GetTimeZoneInformation
GetVersion
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LocalFree
LockResource
MoveFileA
MultiByteToWideChar
OpenProcess
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFileAttributesA
SetFilePointer
SetHandleCount
SetLastError
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UpdateResourceA
VirtualAlloc
VirtualFree
WideCharToMultiByte
WinExec
WriteFile
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
gethostname
htons
inet_addr
recv
select
send
socket
GetFileTitleA
ExtractIconA
CallNextHookEx
DispatchMessageA
EnumThreadWindows
ExitWindowsEx
GetActiveWindow
GetKeyboardState
GetMessageA
GetParent
GetWindowTextA
MessageBoxA
SetWindowsHookExA
ToAscii
TranslateMessage
UnhookWindowsHookEx
wsprintfA
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoUninitialize
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ