?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
8484f0dd5bd5e2b34591dc2128d7c4e0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8484f0dd5bd5e2b34591dc2128d7c4e0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
8484f0dd5bd5e2b34591dc2128d7c4e0_JaffaCakes118
Size
97KB
MD5
8484f0dd5bd5e2b34591dc2128d7c4e0
SHA1
99e9c65a25d02141dbb17711f5dbd6fa66a2b63f
SHA256
e7946a6aa3cffd4d6855ab174c4989f48620a9a9a678e5bfd27320d8787ff5e7
SHA512
91e1c39cc9552692b57a0b916206b5e5d2d9be1ee8651ef0a0ac198ec7469835c6adb8107266ea903902b469e915e6283319c9130cbd9614f6c5f93c1e3de58d
SSDEEP
3072:Fa7Nn38fGSTH1an5f6wXvxWs3/vrZAlnlQgn21v4:o3DSTW5iwXvQsvry21A
Checks for missing Authenticode signature.
resource |
---|
8484f0dd5bd5e2b34591dc2128d7c4e0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrPBrkW
PathGetDriveNumberA
UrlCompareA
PathIsSameRootA
PathIsPrefixA
UrlGetPartA
PathIsRootW
PathMakePrettyA
StrCSpnA
StrToIntW
ChrCmpIA
IsMenu
LoadBitmapA
IsCharLowerA
GetClassLongA
GetActiveWindow
GetProcessWindowStation
lstrcatA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ