?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
2a90d5b4d4e76abbcc4f6a78c2f90130_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a90d5b4d4e76abbcc4f6a78c2f90130_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
2a90d5b4d4e76abbcc4f6a78c2f90130_JaffaCakes118
Size
94KB
MD5
2a90d5b4d4e76abbcc4f6a78c2f90130
SHA1
9b2eb46e10327ddd0e4d89437ba7e8d296864e21
SHA256
7e71a848a11a064b17f63423c4f36f9c051799fa0159a93bbec40906fc3d4ccd
SHA512
d8dccbf80d09747db70746788a070663815d66cdda786712cd5d7c272f650dfc1d8fccfc5af6979532f7ab2bf924efd7e1dfbf6defee12caa022a910292f65ef
SSDEEP
1536:SkNSBYvaQCNH1an5f6wsMvmvC4NuilrCzLfnbfaEWQXH7l6lLrFM:5NSvTH1an5f6wXvm64NjrufWVU56lfS
Checks for missing Authenticode signature.
resource |
---|
2a90d5b4d4e76abbcc4f6a78c2f90130_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
UrlCompareA
StrCSpnA
PathMakePrettyA
PathIsPrefixA
StrToIntW
PathGetDriveNumberA
UrlGetPartA
PathIsRootW
StrPBrkW
PathIsSameRootA
ChrCmpIA
GetActiveWindow
LoadBitmapA
GetClassLongA
GetProcessWindowStation
IsCharLowerA
IsMenu
lstrcatA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ