__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
45fb6b2e66740aa07d6cba873e42252d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45fb6b2e66740aa07d6cba873e42252d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
45fb6b2e66740aa07d6cba873e42252d_JaffaCakes118
Size
93KB
MD5
45fb6b2e66740aa07d6cba873e42252d
SHA1
b45ac53105d1fa69411adbfb9143ffafc6a9c8f4
SHA256
d9769e2c012ada7c4397b418a0c6251f0e376f2f9402151918e3e0733f8aa2cb
SHA512
4c634e945ad63b4333f5032860107f44ab4fe7c40ae781cd0cd1241741eb72371eacf49dc1aabcb10f409e4dc1bd68ee698f5a75924fc5475bba8e65ba806627
SSDEEP
1536:06Q7MNZySLbDwLT+h070RptEXyT5Q/RGrF9GMGLOU8Ks+wdCx78fz3/0xMC:0MNZyS2A0LClQ/R8OOU8KsuM0u
Checks for missing Authenticode signature.
resource |
---|
45fb6b2e66740aa07d6cba873e42252d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
BackupRead
CloseHandle
CreateFileA
DeleteCriticalSection
DeleteTimerQueueTimer
EnterCriticalSection
EnumDateFormatsA
EnumDateFormatsW
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetNamedPipeHandleStateW
GetOEMCP
GetPrivateProfileSectionW
GetProcAddress
GetProcessHeap
GetProfileStringA
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
RaiseException
RemoveDirectoryW
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualLock
VirtualQuery
WaitForMultipleObjectsEx
WriteFile
BeginPath
CancelDC
ColorCorrectPalette
CopyMetaFileA
CreateBitmapIndirect
CreateColorSpaceW
CreateAcceleratorTableA
DdeCreateStringHandleW
DestroyCaret
EnumThreadWindows
GetMessageTime
GetWindowInfo
MessageBoxA
WaitForInputIdle
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE