pJQInst
pJQRun
pJQShutdown
pJQStartup
pJQTest
Static task
static1
Behavioral task
behavioral1
Sample
2e2133bc5aeb33398248f93d00e300fb_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e2133bc5aeb33398248f93d00e300fb_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2e2133bc5aeb33398248f93d00e300fb_JaffaCakes118
Size
32KB
MD5
2e2133bc5aeb33398248f93d00e300fb
SHA1
7c3f4eeaa611e14c5a06799c1faaa08fc3c215e6
SHA256
063b30668cd35d0c4f1bff98f6869ac0ee60fd23d3c2576725736472b409e97b
SHA512
fd4e1731ed3e729413752797931dd5a63087db48c6af4ac93f3e432862daa38457ecffe6ccbd705dc2c19fce8d9098778a975ee7a36dd0327716fa6d1b005c25
SSDEEP
768:cz3D//Q0A1orgoL2ik6ozQP7TCpdxB2VDYwT:cXG1o8oPJ4dCn
Checks for missing Authenticode signature.
resource |
---|
2e2133bc5aeb33398248f93d00e300fb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetTempPathA
lstrlenA
GetSystemTime
lstrcpynA
lstrcatA
CreateThread
GetLastError
WaitForSingleObject
GetFileSize
WritePrivateProfileStringA
OpenProcess
MoveFileA
GetVolumeInformationA
lstrcmpA
CreateEventA
GetLocaleInfoA
MoveFileExA
GetModuleHandleA
FreeLibrary
GetSystemDirectoryA
SystemTimeToFileTime
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
CreateFileA
VirtualAlloc
lstrcpyA
VirtualFree
GetWindowsDirectoryA
LoadLibraryA
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
HeapAlloc
DeleteFileA
HeapFree
GetProcessHeap
ResumeThread
GetThreadContext
SetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
Sleep
GetVersion
ExitProcess
CloseHandle
CreateMutexA
GetModuleFileNameA
WriteFile
FindAtomA
GetLocalTime
GetProcAddress
GetTickCount
IsDebuggerPresent
GetThreadDesktop
SetThreadDesktop
CloseDesktop
OpenInputDesktop
FindWindowExA
FindWindowA
DispatchMessageA
GetMessageA
GetWindowThreadProcessId
CreateWindowExA
GetWindowRect
DefWindowProcA
RegisterClassExA
SetWindowsHookExA
GetCursorPos
GetFocus
EqualRect
TranslateMessage
IsWindowVisible
InflateRect
LoadCursorA
LoadIconA
GetCaretPos
CallNextHookEx
PostMessageA
wsprintfA
ClientToScreen
OpenProcessToken
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
RegEnumValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
SHDeleteValueA
pJQInst
pJQRun
pJQShutdown
pJQStartup
pJQTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ