?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ada49d5c99e48c610b0171c473d6050.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7ada49d5c99e48c610b0171c473d6050.exe
Resource
win10v2004-20241007-en
Target
JaffaCakes118_7ada49d5c99e48c610b0171c473d6050
Size
94KB
MD5
7ada49d5c99e48c610b0171c473d6050
SHA1
48752ab1ccc35953a562b8c6a0049d44213901ce
SHA256
5fdc3b59759ab0f1eda7eeeb09dbe08f1560525a7ec97df4ea3079ada863701a
SHA512
49973f3bfa405f690dc7f36599451cb6aa83a1f0aaa0fd3feaada84d8474bac7add253374bf340ad1c53ed9b87d2b1c2fa2f2e3f4f10ef2a064bedfb5de14a7e
SSDEEP
1536:/q7Ng88hoJrQCNH1an5f6wsMvjvC46uhwAd8zLfnQfaEWuXH7l60m:/q7NgbhopTH1an5f6wXvj646KdkfRVqo
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_7ada49d5c99e48c610b0171c473d6050 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrCSpnA
StrToIntW
StrPBrkW
PathGetDriveNumberA
PathIsSameRootA
PathIsRootW
PathMakePrettyA
PathIsPrefixA
UrlCompareA
UrlGetPartA
ChrCmpIA
lstrcatA
GetClassLongA
GetActiveWindow
GetProcessWindowStation
LoadBitmapA
IsMenu
IsCharLowerA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ