__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
564aa2e56649115d59585928f7e7cb6f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
564aa2e56649115d59585928f7e7cb6f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
564aa2e56649115d59585928f7e7cb6f_JaffaCakes118
Size
153KB
MD5
564aa2e56649115d59585928f7e7cb6f
SHA1
38fdf9052ab51c4d2e7e48419576d4e33e7de16c
SHA256
c51f7360b12fbac8fe46fdfd456b7a06f35f24fbae2c8c2ec51893dde788fd02
SHA512
be1a9dee8af01ba5f5313e3513646ef36c80dee68d57f2d8f4f34a3a88f3f1695aa0c7b6d5d568b3f6efc506ecb48efd59592fdb3fb7df8323c14eec493789d5
SSDEEP
3072:af1CFu2iUoi8oW+Pxc0+ibi/Wtxqr032j3Qe77zyY/0q1a55GEy:ai/oi8oW+zAmqr9j3QeuY/YG
Checks for missing Authenticode signature.
resource |
---|
564aa2e56649115d59585928f7e7cb6f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
CloseHandle
CompareStringA
CopyFileA
CreateEventA
CreateFileA
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetDiskFreeSpaceA
GetEnvironmentStrings
GetFileAttributesA
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeExA
GetStringTypeW
GetSystemDirectoryA
GetThreadLocale
GetVersion
GetVersionExA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
ReadFile
ResetEvent
RtlUnwind
SetConsoleCtrlHandler
SetEndOfFile
SetEvent
SetFilePointer
SetHandleCount
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpynA
lstrlenA
ShellExecuteA
CharNextA
CreateWindowExA
DefWindowProcA
DispatchMessageA
EnumThreadWindows
FindWindowA
FindWindowExA
GetKeyboardType
GetMessageA
GetSystemMetrics
IsWindow
KillTimer
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PostQuitMessage
RegisterClassExA
SendMessageA
SetTimer
ShowWindow
TranslateMessage
wsprintfA
SafeArrayCreate
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VarBoolFromStr
VarBstrFromBool
VarBstrFromCy
VarBstrFromDate
VarCyFromStr
VarDateFromStr
VarI4FromStr
VarNeg
VarNot
VarR8FromStr
VariantChangeTypeEx
VariantClear
VariantCopy
VariantCopyInd
VariantInit
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ