?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
a6fcc7c2fb3c5498d62626e6fefe4ab0_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a6fcc7c2fb3c5498d62626e6fefe4ab0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
a6fcc7c2fb3c5498d62626e6fefe4ab0_JaffaCakes118
Size
94KB
MD5
a6fcc7c2fb3c5498d62626e6fefe4ab0
SHA1
ed51b38ebb9c656664b0578fa587c5f38e8abfcd
SHA256
e33f2c8f18c697ad5c20ae4eaf4daf1e695e40aed6fde416868b908db4e95ae4
SHA512
543916f8bf0fc23c166fa0ce9dc12f02368f7a2c15ee630e346500842cf468d1e7c5242b69b7cb9562f88b4e8be392928f0e10b08cf126ddfa1c50518797ea13
SSDEEP
1536:Zq7Ng88hoJrQCNH1an5f6wsMvjvC46uhwAd8zLfnQfaEWuXH7l60m:Zq7NgbhopTH1an5f6wXvj646KdkfRVqo
Checks for missing Authenticode signature.
resource |
---|
a6fcc7c2fb3c5498d62626e6fefe4ab0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrCSpnA
StrToIntW
StrPBrkW
PathGetDriveNumberA
PathIsSameRootA
PathIsRootW
PathMakePrettyA
PathIsPrefixA
UrlCompareA
UrlGetPartA
ChrCmpIA
lstrcatA
GetClassLongA
GetActiveWindow
GetProcessWindowStation
LoadBitmapA
IsMenu
IsCharLowerA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ