?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
f4c58ac7269b5240a70b3ecd034b2745_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4c58ac7269b5240a70b3ecd034b2745_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
f4c58ac7269b5240a70b3ecd034b2745_JaffaCakes118
Size
98KB
MD5
f4c58ac7269b5240a70b3ecd034b2745
SHA1
c415c65dba232af5bc069f0be0acb596629f0645
SHA256
1c19c4e73976f9c01c89eb72cd32062bfbdd1235aa1d7273779d86528b045f14
SHA512
1eb2b71c1710aea039df2789c9e4176b6dbc2f07127c4ba06c3b799d70dfd8ada2de010e3c96e696d7bb25bdea9ccbdd0feeb6f24cb1c4173d4bc4fec5e6bece
SSDEEP
3072:vW+ek2X5NSCwzDyquL8oTNQnXFfFAXqaX8isBbfN:OfWo84N4XFf0X83BbF
Checks for missing Authenticode signature.
resource |
---|
f4c58ac7269b5240a70b3ecd034b2745_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrPBrkA
StrCmpLogicalW
ChrCmpIW
StrStrIW
UrlCompareA
PathIsRootW
ord29
UrlGetPartA
StrToIntA
PathGetCharTypeW
PathIsSameRootA
PathGetDriveNumberW
lstrcatA
IsCharLowerA
GetProcessWindowStation
LoadBitmapA
IsMenu
GetClassLongA
GetActiveWindow
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ