gQfInst
gQfRun
gQfShutdown
gQfStartup
gQfTest
Static task
static1
Behavioral task
behavioral1
Sample
b91d46a920c5f31e8ea101ad28cd1452_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b91d46a920c5f31e8ea101ad28cd1452_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b91d46a920c5f31e8ea101ad28cd1452_JaffaCakes118
Size
32KB
MD5
b91d46a920c5f31e8ea101ad28cd1452
SHA1
f93184a5220718af252b80c90aac17354b08b5df
SHA256
c3594ba0f721c2ff33b6e0f79d307896fa1efd003bcef3368f8724d3fa133631
SHA512
4077c0dc85ad30a95a566df6082d9b3c26416df17f09cb2c7471571b7a28b47b807af0c93556f53e0aae93bfc21141b4a7839555b24ce617929de69c75a0ae8d
SSDEEP
384:P/jvUdLp/dYbUAqx3sYrNZqUglVU+llVs8jamUpFXjq8cz9TH8Jk7Rqm+0T2nEv+:0RtjglVU+lXtCFXjmztd92EBKFXDp
Checks for missing Authenticode signature.
resource |
---|
b91d46a920c5f31e8ea101ad28cd1452_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindAtomA
GetModuleFileNameA
CreateMutexA
WriteFile
CloseHandle
GetVersion
GetTempPathA
Sleep
GetSystemTime
SystemTimeToFileTime
lstrcmpiA
GetProcAddress
SetEvent
lstrcpyA
VirtualAlloc
VirtualFree
GetWindowsDirectoryA
LoadLibraryA
WritePrivateProfileStringA
MoveFileA
GetFileSize
OpenProcess
GetVolumeInformationA
lstrcmpA
CreateEventA
GetModuleHandleA
GetLocaleInfoA
GetTickCount
FreeLibrary
GetCurrentThreadId
GetSystemDirectoryA
GetVersionExA
GetTempFileNameA
HeapAlloc
WriteProcessMemory
DeleteFileA
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
VirtualProtectEx
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
GetThreadContext
SetThreadContext
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
GetLocalTime
WaitForSingleObject
GetLastError
lstrcpynA
lstrlenA
lstrcatA
CreateFileA
CreateThread
MoveFileExA
CreateProcessA
IsDebuggerPresent
SetThreadDesktop
SetWindowsHookExA
GetWindowRect
GetCursorPos
FindWindowExA
GetFocus
CallNextHookEx
PostMessageA
wsprintfA
EqualRect
GetThreadDesktop
OpenInputDesktop
GetCaretPos
IsWindowVisible
FindWindowA
InflateRect
GetWindowThreadProcessId
ClientToScreen
CloseDesktop
RegOpenKeyExA
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
RegEnumValueA
OpenProcessToken
RegDeleteKeyA
RegEnumKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
gQfInst
gQfRun
gQfShutdown
gQfStartup
gQfTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ