?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
2933e43aba44b731aff59da4e0272b80_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2933e43aba44b731aff59da4e0272b80_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
2933e43aba44b731aff59da4e0272b80_JaffaCakes118
Size
94KB
MD5
2933e43aba44b731aff59da4e0272b80
SHA1
b0fa2bb2852384c713036fedbc2888319889443b
SHA256
f4f884bd3f892c5d435c3ceb6523fc88ea2df85d48b276d2a71168d75acd9dd4
SHA512
dea579fdd6c9f42cccfa4f4acc617470b6d61a734a676f2fee675def1048d675105987fb2d6538ebb58f5d51192741b4b4ab49fa809d6293b61a3bc741befb48
SSDEEP
1536:lBVjPkuZNlEY7aYLQGHr8/AQCNH1an5f6wsMv9vC4tucYSTPzLfnxfaEWJXH7l6r:lBpnNlEcLliATH1an5f6wXv964t8Sjf/
Checks for missing Authenticode signature.
resource |
---|
2933e43aba44b731aff59da4e0272b80_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadBitmapA
IsMenu
IsCharLowerA
GetClassLongA
GetActiveWindow
GetProcessWindowStation
PathIsSameRootA
StrToIntW
ChrCmpIA
UrlGetPartA
PathMakePrettyA
StrPBrkW
UrlCompareA
PathGetDriveNumberA
StrCSpnA
PathIsRootW
PathIsPrefixA
lstrcatA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ