?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
b6cc2bb6cf2f0ce8dd6f45de0515bc90_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b6cc2bb6cf2f0ce8dd6f45de0515bc90_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
b6cc2bb6cf2f0ce8dd6f45de0515bc90_JaffaCakes118
Size
94KB
MD5
b6cc2bb6cf2f0ce8dd6f45de0515bc90
SHA1
f56dbc0ec568a78ce3daef2117337ef4632b6120
SHA256
26827c1bd3c5933dfed1b971fe932907cd1914cd0df8e4c06c3f8753aab72c6c
SHA512
a5ce33bfad32cd9e6c6656a9a4b51fc5fcbc656ec8885a24a1cc010a02e0b34d3f5ac58bf249cadcdc0d81fce644d54cc0c8f30811ac2875770dbe706c004a2f
SSDEEP
1536:fQNHMsjm7SQCNH1an5f6wsMvgvC4ruQqZNrzLfn3faEWkXH7l6uS2x:4NHI7STH1an5f6wXvg64rJYN7fCV456j
Checks for missing Authenticode signature.
resource |
---|
b6cc2bb6cf2f0ce8dd6f45de0515bc90_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadBitmapA
IsMenu
GetClassLongA
GetActiveWindow
IsCharLowerA
GetProcessWindowStation
ord29
StrCSpnA
UrlGetPartA
PathIsSameRootA
ChrCmpIA
StrPBrkA
StrStrW
UrlCompareA
PathIsRootW
PathGetDriveNumberA
StrCmpNW
lstrcatA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ