?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
d2aeb6af47642abcd19b69fbdaab6af0_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d2aeb6af47642abcd19b69fbdaab6af0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
d2aeb6af47642abcd19b69fbdaab6af0_JaffaCakes118
Size
94KB
MD5
d2aeb6af47642abcd19b69fbdaab6af0
SHA1
dcfb069794cd488a04c0752533b93acf06b9ff24
SHA256
558e3fca4cab84fc222d1b372ae6576f626e05224516730bcfd400282b57dc4a
SHA512
2a6ce59197cacb972713e6e1a64a9c420c7eb31d0eeec6ff4b82a5c35f77b21ad416f5b86c913ca19b90f0a7ad0dbb11328315acd877643c47cf470b59619bbd
SSDEEP
1536:dQNHMsjm7SQCNH1an5f6wsMvgvC4ruQqZNrzLfn3faEWkXH7l6uS2x:eNHI7STH1an5f6wXvg64rJYN7fCV456j
Checks for missing Authenticode signature.
resource |
---|
d2aeb6af47642abcd19b69fbdaab6af0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadBitmapA
IsMenu
GetClassLongA
GetActiveWindow
IsCharLowerA
GetProcessWindowStation
ord29
StrCSpnA
UrlGetPartA
PathIsSameRootA
ChrCmpIA
StrPBrkA
StrStrW
UrlCompareA
PathIsRootW
PathGetDriveNumberA
StrCmpNW
lstrcatA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ