?a73957838_2@@YAXXZ
?a84884@@YAXXZ
?b823838_9839@@YAXXZ
?e747383_94@@YAXXZ
?e83834@@YAXXZ
?e929348_827@@YAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
EquationLaser_752AF597E6D9FD70396ACCC0B9013DBE.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
EquationLaser_752AF597E6D9FD70396ACCC0B9013DBE.dll
Resource
win10v2004-20240508-en
Target
362c95d2710dbbd3aebcfb7748cce561_JaffaCakes118
Size
72KB
MD5
362c95d2710dbbd3aebcfb7748cce561
SHA1
c22d51c47e820758b3d6cd9c9cee6ccb9fca4844
SHA256
7a23cccc550ef10ecd6f573380334ef95b3b72da7e30f247fcadb2a231e7ed1a
SHA512
76839d6e5c46d8b85d4510c6d260251df70bef5f50f35b112632cc8ce39cf4ba31c0daaf236ff598aaf73950030f155c85f5c0bc77ce561c93c55f6e83c26075
SSDEEP
1536:5AszP9aDo1MF3/sZ3lnePoTr2cNGnpmZEX7NPf8UC4ShJ5CDBkE+:51skmJ/sfe9X7hdOJ56Bo
Checks for missing Authenticode signature.
resource |
---|
unpack001/EquationLaser_752AF597E6D9FD70396ACCC0B9013DBE |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WSACleanup
gethostname
gethostbyname
closesocket
sendto
recv
recvfrom
WSAStartup
ioctlsocket
setsockopt
select
__WSAFDIsSet
getsockopt
WSAGetLastError
socket
bind
getsockname
SetThreadPriority
GetCurrentThread
CloseHandle
DeviceIoControl
SleepEx
ResumeThread
TerminateThread
WaitForMultipleObjects
GetVersion
ReleaseSemaphore
InterlockedDecrement
InterlockedIncrement
CreateFileA
GetVersionExA
SetErrorMode
FreeLibrary
GetProcAddress
LoadLibraryA
CreateMutexA
GetSystemTimeAsFileTime
lstrcatA
GetComputerNameA
CreateSemaphoreA
GetCurrentProcess
MultiByteToWideChar
WaitForSingleObject
GetSystemTime
CreateMailslotA
WriteFile
ReadFile
GetMailslotInfo
UnmapViewOfFile
lstrcmpiA
MapViewOfFile
CreateFileMappingA
HeapAlloc
GetProcessHeap
lstrcpynA
GetFileSize
HeapFree
SetEvent
CreateEventA
FreeLibraryAndExitThread
GetLastError
GetWindowsDirectoryA
FindClose
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
GetSystemDirectoryA
CopyFileA
DeleteFileA
SetFileTime
LocalFree
LocalAlloc
SetFileAttributesA
GetFileTime
GetFileAttributesA
FindCloseChangeNotification
FindNextChangeNotification
RemoveDirectoryA
FindFirstChangeNotificationA
CreateDirectoryA
GetModuleHandleA
WideCharToMultiByte
GetLocalTime
GetDriveTypeA
GetVolumeInformationA
ResetEvent
WaitForSingleObjectEx
SetFilePointer
LocalReAlloc
GetCurrentProcessId
GetCurrentThreadId
InterlockedExchange
lstrcpyW
lstrlenW
lstrcmpW
LoadLibraryW
GetDiskFreeSpaceA
GetLogicalDriveStringsA
OpenProcess
GetTempPathA
LocalFileTimeToFileTime
lstrcmpA
FindFirstFileW
CopyFileW
CreateDirectoryW
CreateFileW
DeleteFileW
RemoveDirectoryW
CreateProcessA
CreateProcessW
GetStartupInfoA
GetStartupInfoW
MoveFileA
MoveFileW
WritePrivateProfileStringA
MoveFileExA
MoveFileExW
GetFileAttributesW
SetFileAttributesW
FindNextFileW
CompareFileTime
GetCurrentDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryA
SetCurrentDirectoryW
Sleep
lstrlenA
lstrcpyA
GetTickCount
GlobalAlloc
DosDateTimeToFileTime
CharUpperW
CharUpperA
MessageBoxA
SetWindowsHookExA
UnhookWindowsHookEx
ExitWindowsEx
wsprintfA
EnumWindows
GetWindowTextA
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
CloseWindowStation
CloseDesktop
CallNextHookEx
GetWindowThreadProcessId
RegQueryInfoKeyA
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RevertToSelf
LogonUserA
OpenProcessToken
ImpersonateLoggedOnUser
GetUserNameA
RegNotifyChangeKeyValue
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
OpenSCManagerA
CloseServiceHandle
RegEnumValueW
RegEnumValueA
RegEnumKeyExW
RegEnumKeyExA
RegQueryInfoKeyW
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
rand
_endthreadex
_beginthreadex
_except_handler3
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
memcpy
time
_ftol
memcmp
memmove
qsort
_stricmp
wcscmp
free
strstr
malloc
strcat
realloc
strlen
atol
strcpy
isdigit
sprintf
strcmp
_strupr
exit
wcslen
wcsstr
__dllonexit
_onexit
_initterm
_adjust_fdiv
srand
?a73957838_2@@YAXXZ
?a84884@@YAXXZ
?b823838_9839@@YAXXZ
?e747383_94@@YAXXZ
?e83834@@YAXXZ
?e929348_827@@YAXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ