?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
4994a9999d8f4230cc80fca302e9f0e0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4994a9999d8f4230cc80fca302e9f0e0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
4994a9999d8f4230cc80fca302e9f0e0_JaffaCakes118
Size
94KB
MD5
4994a9999d8f4230cc80fca302e9f0e0
SHA1
7c87bdc263a1737b1673805a5789cae768f4d8ae
SHA256
32c11b5a672d3934ed340ceaf09ce8d8a45cc6334468fff0dbb4f455fcddec77
SHA512
abf703ff41b2068db90870a9e05bab5e81cb84fc2a9c8ca4a52237ae22e1f3cfb919f4fe9d3d41c152eb5298a69b6ed47dbb4a298aa7b2e850348ac3f23ac938
SSDEEP
1536:xq7Ng88hoJrQCNH1an5f6wsMvjvC46uhwAd8zLfnQfaEWuXH7l60m:xq7NgbhopTH1an5f6wXvj646KdkfRVqo
Checks for missing Authenticode signature.
| resource |
|---|
| 4994a9999d8f4230cc80fca302e9f0e0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrCSpnA
StrToIntW
StrPBrkW
PathGetDriveNumberA
PathIsSameRootA
PathIsRootW
PathMakePrettyA
PathIsPrefixA
UrlCompareA
UrlGetPartA
ChrCmpIA
lstrcatA
GetClassLongA
GetActiveWindow
GetProcessWindowStation
LoadBitmapA
IsMenu
IsCharLowerA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ