?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
5428f138a14e8fdf506f6bd0204fe090_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5428f138a14e8fdf506f6bd0204fe090_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
5428f138a14e8fdf506f6bd0204fe090_JaffaCakes118
Size
67KB
MD5
5428f138a14e8fdf506f6bd0204fe090
SHA1
52568370c49b13b28ef36da2113d9679c05797f2
SHA256
ff14dcce14f73bfc787fe3875e9749163aae61be9144fd6be0bacb8ef09972ee
SHA512
b59f2b49990e726610d3dc1974008998cd5eb4b77f9f90d8067001d614a71c3cc1401523994ac72bb956deef5a49352d00dfe0b8beb0ff0ced8a1ff4bb2502d8
SSDEEP
1536:9lk1636gsaBOQCNH1an5f6wsMvVFCqiRJoxUim1xB:I1636sBOTH1an5f6wXvtyJsf
Checks for missing Authenticode signature.
resource |
---|
5428f138a14e8fdf506f6bd0204fe090_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetClassLongA
IsCharLowerA
GetActiveWindow
IsMenu
LoadBitmapA
GetProcessWindowStation
lstrcatA
StrCSpnA
ChrCmpIA
PathIsPrefixA
PathGetDriveNumberA
UrlGetPartA
UrlCompareA
StrPBrkW
PathIsSameRootA
PathMakePrettyA
StrToIntW
PathIsRootW
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ