DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Overview
overview
7Static
static
73402521441/IECache.js
windows7-x64
33402521441/IECache.js
windows10-2004-x64
33402521441/ZLIB.js
windows7-x64
33402521441/ZLIB.js
windows10-2004-x64
33402521441/ZLIB.js
windows7-x64
33402521441/ZLIB.js
windows10-2004-x64
33402521441...ine.js
windows7-x64
33402521441...ine.js
windows10-2004-x64
33402521441...ine.js
windows7-x64
33402521441...ine.js
windows10-2004-x64
31.js
windows7-x64
31.js
windows10-2004-x64
32.js
windows7-x64
32.js
windows10-2004-x64
31.html
windows7-x64
11.html
windows10-2004-x64
12.js
windows7-x64
32.js
windows10-2004-x64
31.js
windows7-x64
31.js
windows10-2004-x64
32.js
windows7-x64
32.js
windows10-2004-x64
31.html
windows7-x64
11.html
windows10-2004-x64
12.js
windows7-x64
32.js
windows10-2004-x64
31.html
windows7-x64
11.html
windows10-2004-x64
12.js
windows7-x64
32.js
windows10-2004-x64
31.html
windows7-x64
11.html
windows10-2004-x64
1Behavioral task
behavioral1
Sample
3402521441/IECache.js
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3402521441/IECache.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
3402521441/ZLIB.js
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
3402521441/ZLIB.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
3402521441/ZLIB.js
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
3402521441/ZLIB.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
3402521441/datedefine.js
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
3402521441/datedefine.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
3402521441/datedefine.js
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
3402521441/datedefine.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
1.js
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
1.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
2.js
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
2.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
1.html
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
1.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
2.js
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
2.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
1.js
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
1.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
2.js
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
2.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
1.html
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
1.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
2.js
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
2.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
1.html
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
1.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
2.js
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
2.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
1.html
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
1.html
Resource
win10v2004-20240226-en
Target
05a330f64b47962406d0e82ca1c105a6_JaffaCakes118
Size
10.5MB
MD5
05a330f64b47962406d0e82ca1c105a6
SHA1
8956e9c211d6d4585fef0618e44c58614a6b825d
SHA256
04e0efa850130782e83ad91f3f8401b76c97f91219b8d183cc1af3d0dca2a301
SHA512
321e9aa236f1b671a9bea3c31900a2766c6a5eb227e9a6c648654f191582e26914c104691849a702085ae45d39c5c09da7541eb85377fe01fbcafebb8d2162c9
SSDEEP
196608:lmTDRa6AlGevM23bepSthxLEHwk+nQYnSwDuNoqDzYiatyAnI0P6z5c8A7Rh79h9:nGR2KpSXxLEQk+NnLUoqDzYiq7g5cbtr
resource | yara_rule |
---|---|
static1/unpack001/3402521441/控件/LMD.EXE | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/3402521441/flashcollect.exe |
unpack001/3402521441/ie扩展/IEContextMenu.dll |
unpack001/3402521441/ie扩展/REGSVR32.EXE |
unpack001/3402521441/卸载/uninstall.exe |
unpack001/3402521441/控件/LMD.EXE |
unpack001/3402521441/控件/ZIP.EXE |
unpack001/3402521441/控件/dragdrop.exe |
unpack001/3402521441/转换/dbtoexe.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
_controlfp
__argv
_ismbblead
_stricmp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
__argc
_splitpath
RegOpenKeyExA
RegQueryValueA
RegCloseKey
GetStartupInfoA
GetModuleHandleA
lstrcatA
LocalAlloc
SetErrorMode
LoadLibraryExA
GetLastError
FormatMessageA
GetProcAddress
FreeLibrary
MultiByteToWideChar
lstrcpyW
lstrcpyA
lstrlenA
LoadStringA
wsprintfA
MessageBoxA
OleInitialize
OleUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetErrorMode
lstrlenA
_lopen
GetCommandLineA
GetModuleHandleA
GetModuleFileNameA
_lwrite
_llseek
GlobalUnlock
lstrcpyA
MulDiv
_lclose
GlobalAlloc
GlobalFree
_lcreat
LoadLibraryA
GetProcAddress
FreeLibrary
OpenFile
GetVersionExA
GetCurrentProcess
WinExec
ExitProcess
_lread
GetTempPathA
GetTempFileNameA
GlobalLock
GetDC
PostQuitMessage
InvalidateRect
BeginPaint
EndPaint
SendMessageA
DefWindowProcA
GetClientRect
CreateWindowExA
ReleaseDC
SetWindowPos
ShowWindow
LoadIconA
LoadCursorA
RegisterClassA
MessageBoxA
ExitWindowsEx
SetTimer
UpdateWindow
DeleteObject
GetStockObject
GetDeviceCaps
PatBlt
CreateSolidBrush
GetTextExtentPointA
TextOutA
SetTextColor
SetBkMode
SelectObject
StretchDIBits
SelectPalette
CreatePalette
CreateFontA
RealizePalette
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
_MainWndProc@16
_StubFileWrite@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ