?FormFactor@@YGXUverifyEw@CA7
?FormWeight@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
84ffd68fe79f6f2c710d40b3f1844e60_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
84ffd68fe79f6f2c710d40b3f1844e60_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
84ffd68fe79f6f2c710d40b3f1844e60_JaffaCakes118
Size
95KB
MD5
84ffd68fe79f6f2c710d40b3f1844e60
SHA1
c890f607ac945691addddf6f04fb9963eb827829
SHA256
2f57cc1c4ba03598669c22b4f3abc1d65d4ebf19e13239923d534574bc74df15
SHA512
c1ab6233ce58d431313f1790cde0ee0cd4ae7ba82171894f91def0ddd65b1381a76d79032da24570a5ce492c0091f0d44aa0c81c103dbe71a00de0655143ff78
SSDEEP
1536:4qfihnCypA8yUAUtwYsaw6qbKXK1A7OI+c8TFM8Eko7Rs0X0vRAs+vw11hoC:ohnZp7/Rtwh6qbK61Yd8TTEko7KNuRC
Checks for missing Authenticode signature.
Processes:
resource |
---|
84ffd68fe79f6f2c710d40b3f1844e60_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrCmpLogicalW
StrStrIW
StrPBrkA
PathGetCharTypeW
PathGetDriveNumberW
ChrCmpIW
UrlCompareA
PathIsRootW
PathIsSameRootA
UrlGetPartA
StrToIntA
ord29
lstrcatA
LoadBitmapA
IsMenu
GetProcessWindowStation
GetClassLongA
GetActiveWindow
IsCharLowerA
?FormFactor@@YGXUverifyEw@CA7
?FormWeight@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ