__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
4365726d31933ae4d5c71ba587824d86_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4365726d31933ae4d5c71ba587824d86_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
4365726d31933ae4d5c71ba587824d86_JaffaCakes118
Size
124KB
MD5
4365726d31933ae4d5c71ba587824d86
SHA1
c59041cf37fa4d77c1b23975d37b5ce5c912e06d
SHA256
2ad6371aee74a521de1ef720739bf110f1cba09b38fe3ac9250ac9355b2f9762
SHA512
fe4b2680c1a790743f478ebcfee01e2026a74e23c96236501dfd2ee1fd1e5b04003c103eaf14b693d4683593612ca7ae2880e5d9973b94de136353efa1405a4b
SSDEEP
3072:kEg6ke0I42X45ctIWyV4B4MSAKzL3J3cFjyHbkbZB1R5yH:i6kq42oSWh+qxtP3iFe7YZTo
Checks for missing Authenticode signature.
resource |
---|
4365726d31933ae4d5c71ba587824d86_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
lstrcmpA
lstrcmpW
AppendMenuA
BeginDeferWindowPos
CharNextA
CharUpperBuffW
CopyIcon
CreateCaret
CreateDialogIndirectParamW
DdeGetLastError
DispatchMessageA
DrawStateW
EnumChildWindows
EnumThreadWindows
EnumWindowStationsA
GetDlgItemTextW
GetInputState
GetKeyboardLayoutNameW
GetMenuStringW
GetTabbedTextExtentW
GetUpdateRgn
GetUserObjectSecurity
GetWindowInfo
InsertMenuW
IsCharAlphaNumericA
IsWindowUnicode
IsWindowVisible
MapDialogRect
MessageBoxA
OpenIcon
RegisterHotKey
RemovePropW
SetFocus
SetRect
SetWindowsHookA
ToAsciiEx
WinHelpW
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ