ForceSubClass
InstallHook
MyDrvTextOut
MySetDDIhook
RemoveHook
SetWindow
_HookProc@12
Static task
static1
Behavioral task
behavioral1
Sample
UpZero.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
UpZero.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Youtube�����_�E�����[�_�[(���܂�2)/YoutubeNet.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Youtube�����_�E�����[�_�[(���܂�2)/YoutubeNet.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
up.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
up.dll
Resource
win10v2004-20240508-en
Target
015f817578568e018b933c68a9eaba8a_JaffaCakes118
Size
207KB
MD5
015f817578568e018b933c68a9eaba8a
SHA1
52e9570985a5ab4ddf3d953f3f7e209d6e0d6e5a
SHA256
d416ca993ae9ea5af285528e84704126096dc103c474b95e15455bea64468826
SHA512
da662f78b9fe2e2432ba1e75776331ed905a88e3fb4c2350029dd520bed79d38768dd0717e2bdae0097af17025a8ab391a77f716b35c38163566bfbb29a0f159
SSDEEP
6144:Gt5yDox+nNNFqF7PY8Aymrguf06YpeyzDH8j0U:GLInxy7v/mhm4
Checks for missing Authenticode signature.
resource |
---|
unpack001/UpZero.exe |
unpack001/Youtube�����_�E�����[�_�[(���܂�2)/YoutubeNet.exe |
unpack001/up.dll |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
GetModuleHandleA
CloseHandle
VirtualProtectEx
WriteProcessMemory
GetCurrentProcess
CreateMutexA
GetModuleFileNameA
FlushFileBuffers
SetStdHandle
ExitProcess
TerminateProcess
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
HeapAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetFilePointer
InterlockedDecrement
InterlockedIncrement
VirtualAlloc
HeapReAlloc
LoadLibraryA
RtlUnwind
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
IsWindow
PostMessageA
PathStripPathA
ForceSubClass
InstallHook
MyDrvTextOut
MySetDDIhook
RemoveHook
SetWindow
_HookProc@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ