?NOTEBOOK@@YG_JUessentialArray@@UL
?PHONERING@@YG_JUessentialArray@@UL
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6988856c01262f573c67a990e828b760.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6988856c01262f573c67a990e828b760.exe
Resource
win10v2004-20241007-en
Target
JaffaCakes118_6988856c01262f573c67a990e828b760
Size
94KB
MD5
6988856c01262f573c67a990e828b760
SHA1
5705be5be49f3e865e68f8a83f3977ad11558cda
SHA256
d6dbf4479855e8c8e3165d2a2fb336e7222adc8e054ad7d9c5c34c52534a4c9a
SHA512
94dcd66187db5f7d6662f1933e688315fbbb87271e354ef3a1de5aba11709ef66730e34295b4c8376a82820534a2efb2f53cf6ccc049123a3d88161603d4c227
SSDEEP
1536:GbMiagSJg5Ggcihr6OhO+NZgXG/GivT/DtMOHmzwaimLlhW45kmRtzqu:GbM7jJmBDhr6OhO+NZkGOWtNHXQL3W4P
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_6988856c01262f573c67a990e828b760 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
MapDialogRect
GetForegroundWindow
IsCharUpperW
GetMessagePos
IsCharAlphaW
StrCmpLogicalW
lstrcpyW
srand
atoi
?NOTEBOOK@@YG_JUessentialArray@@UL
?PHONERING@@YG_JUessentialArray@@UL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ