PQrInst
PQrRun
PQrShutdown
PQrStartup
PQrTest
Static task
static1
Behavioral task
behavioral1
Sample
d2422e0ee546df707dc825ac07a7b93c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2422e0ee546df707dc825ac07a7b93c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d2422e0ee546df707dc825ac07a7b93c_JaffaCakes118
Size
32KB
MD5
d2422e0ee546df707dc825ac07a7b93c
SHA1
e275d9b32289422e732a06807514b23e46a6f0e3
SHA256
2bb2e5760e78e90e0112f87151a740133cb85ef3a8f5a550c8fc4f0424111685
SHA512
34ff994a14ea3bad2818081ae0d79259b41cb5d02ae816185ebfa57a2b4315c48d022c1f31e2cfad4867ed4222b452b0fce02e52dbf43ece27d80c6749505887
SSDEEP
768:3LUYTHOiW3Z6PXLsJdsbnkT7UjsBedgcwRn:7U6HZuvJdigUjscw
Checks for missing Authenticode signature.
resource |
---|
d2422e0ee546df707dc825ac07a7b93c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
FindAtomA
GetModuleFileNameA
CreateMutexA
WriteFile
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
GetSystemDirectoryA
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
VirtualAlloc
VirtualFree
CopyFileA
lstrcpyA
GetWindowsDirectoryA
GetFileSize
LoadLibraryA
OpenProcess
GetVolumeInformationA
WritePrivateProfileStringA
lstrcmpA
MoveFileA
GetLocalTime
CreateEventA
MoveFileExA
FreeLibrary
GetModuleHandleA
SystemTimeToFileTime
WriteProcessMemory
DeleteFileA
HeapAlloc
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
GetThreadContext
SetThreadContext
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
WaitForSingleObject
GetLastError
lstrcpynA
lstrlenA
CreateFileA
lstrcatA
CreateProcessA
CreateThread
GetLocaleInfoA
Sleep
IsDebuggerPresent
SetWindowsHookExA
GetWindowRect
GetCursorPos
GetCaretPos
SetThreadDesktop
PostMessageA
CallNextHookEx
EqualRect
wsprintfA
FindWindowExA
GetThreadDesktop
OpenInputDesktop
GetFocus
ClientToScreen
GetWindowThreadProcessId
IsWindowVisible
FindWindowA
InflateRect
CloseDesktop
RegOpenKeyExA
CreateProcessAsUserA
RegDeleteValueA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
SHDeleteValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
RasEnumDevicesA
GetAdaptersInfo
PQrInst
PQrRun
PQrShutdown
PQrStartup
PQrTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ