?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
d12385a433a35e686e64e7645df19a40_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d12385a433a35e686e64e7645df19a40_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
d12385a433a35e686e64e7645df19a40_JaffaCakes118
Size
95KB
MD5
d12385a433a35e686e64e7645df19a40
SHA1
bf1e0871433ed27e5594ca23d1badee76fbbf19d
SHA256
928c1305038d51c059e82aaab015356e889dd606765840359e342aacb5e26787
SHA512
c7ee4020430417484aa4529f1ebf41c900ac9cdaac119158e19e55eafc130fb4611c5a182b6c7a5e325edaf1173cf1292b91f084857762f52de6ff25a5f8e105
SSDEEP
1536:Dxe28f9HfprCwzs6yOns8i3UExoM/dMeVjefN6RxkusQ+DV0sK1lbFUDJxx:Dxe28nCwzDyUs8izoMq7fcYQ+B0skaDP
Checks for missing Authenticode signature.
resource |
---|
d12385a433a35e686e64e7645df19a40_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ChrCmpIA
StrCmpNW
ord29
PathGetDriveNumberA
StrStrW
UrlCompareA
PathIsRootW
PathIsSameRootA
StrPBrkA
UrlGetPartA
GetClassLongA
LoadBitmapA
IsCharLowerA
IsMenu
GetActiveWindow
GetProcessWindowStation
lstrcatA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.