@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
akkg.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
akkg.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
flash.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
flash.exe
Resource
win10v2004-20241007-en
Target
5610a1db5b122f507edfa9cccb48385e_JaffaCakes118
Size
55KB
MD5
5610a1db5b122f507edfa9cccb48385e
SHA1
adfb3e8938b662700ee952bdebe26544005e8fec
SHA256
c832f5b9bef7ae238407e7501a3521f45521211551f88fe55da70bc70d1f9093
SHA512
812da4d9172d56d8e0886641bd1a756b45f6d2d3d7f0012ba9f22eb61254ce833b9a343829f4a8a9cdf54cd7c7632877c365a8f19cd03f0c003764ba2c12fafb
SSDEEP
1536:cY0i9MgwpQhNbUnPZ1a+WRyw5aBcbLs04bq3:JIgwplnPbjqyw7/s04y
Checks for missing Authenticode signature.
resource |
---|
unpack001/akkg.exe |
unpack001/flash.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__vbaVarTstGt
__vbaVarSub
_CIcos
_adj_fptan
__vbaVarMove
__vbaStrI4
__vbaAryMove
__vbaFreeVar
__vbaLenBstr
__vbaStrVarMove
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
ord516
_adj_fprem1
__vbaRecAnsiToUni
ord518
__vbaCopyBytes
__vbaStrCat
__vbaLsetFixstr
__vbaRecDestruct
__vbaSetSystemError
__vbaHresultCheckObj
__vbaVargVarCopy
_adj_fdiv_m32
__vbaAryVar
__vbaAryDestruct
__vbaBoolStr
__vbaExitProc
__vbaFileCloseAll
ord595
__vbaStrLike
__vbaOnError
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
__vbaVarIndexLoad
ord598
__vbaStrFixstr
__vbaBoolVar
ord522
__vbaBoolVarNull
_CIsin
__vbaErase
ord631
__vbaVarZero
ord525
__vbaChkstk
ord526
__vbaFileClose
__vbaGenerateBoundsError
__vbaStrCmp
__vbaAryConstruct2
__vbaPutOwner3
ord561
__vbaI2I4
__vbaVarLikeVar
__vbaObjVar
DllFunctionCall
ord670
ord563
__vbaLbound
__vbaRedimPreserve
_adj_fpatan
__vbaFixstrConstruct
__vbaRedim
__vbaRecUniToAnsi
ord600
ord601
__vbaUI1I2
_CIsqrt
__vbaExceptHandler
__vbaStrToUnicode
ord713
_adj_fprem
_adj_fdivr_m64
ord608
ord716
__vbaFPException
ord717
__vbaInStrVar
__vbaUbound
__vbaGetOwner3
__vbaStrVarVal
__vbaVarCat
ord535
ord537
ord644
ord645
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaVar2Vec
__vbaInStr
ord648
ord570
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaI4Str
ord681
__vbaFreeStrList
_adj_fdivr_m32
__vbaPowerR8
_adj_fdiv_r
ord100
__vbaVarTstNe
__vbaI4Var
__vbaVarCmpEq
__vbaAryLock
__vbaStrToAnsi
__vbaVarDup
__vbaAryVarVarg
__vbaFpI4
__vbaVarCopy
ord616
ord617
__vbaLateMemCallLd
_CIatan
__vbaAryCopy
__vbaStrMove
__vbaStrVarCopy
ord619
_allmul
_CItan
__vbaAryUnlock
_CIexp
__vbaFreeStr
__vbaFreeObj
__vbaI4ErrVar
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CreateFileA
GetVersionExA
EnterCriticalSection
ExitProcess
DeleteFileA
CloseHandle
GetCommState
GetCommTimeouts
GetCommandLineA
GetCurrentProcess
GetCurrentThreadId
GetACP
GetCPInfo
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetDateFormatA
GetEnvironmentStrings
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetCommState
SetCommTimeouts
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
SetPriorityClass
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
GetVersion
MessageBoxA
EnumThreadWindows
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ