DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
Regsvr32.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Regsvr32.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
TILEPUZ.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
TILEPUZ.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
机器猫拼拼看.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
机器猫拼拼看.exe
Resource
win10v2004-20240508-en
Target
0777a81a4b4664e075dd6be60f667cea_JaffaCakes118
Size
1.6MB
MD5
0777a81a4b4664e075dd6be60f667cea
SHA1
e0aab7958170a45da6a3d95622d617fdef9299d9
SHA256
c998dbdf54dbe82069fa0773356b46fca5181b633c5a4bf788323e360472e704
SHA512
9f4c9183a41f85f7e3bd174591e2d353ca96677d888d436e6d33a75827218355b69290e52b605673366b141468e761caa3386cbbaf27bab3981a2a993bd31b5d
SSDEEP
49152:40DtIENBX3gcu9HQYeWEbiL+HsX0jmX8V:40RHZ3g0YetGLNX0jms
Checks for missing Authenticode signature.
resource |
---|
unpack001/Regsvr32.exe |
unpack001/TILEPUZ.OCX |
unpack001/机器猫拼拼看.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
lstrcpyA
FreeLibrary
GetProcAddress
GetLastError
LoadLibraryA
GetEnvironmentStrings
FreeEnvironmentStringsW
MultiByteToWideChar
LCMapStringA
GetStringTypeW
GetStringTypeA
LCMapStringW
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
GetCPInfo
GetACP
GetOEMCP
RtlUnwind
UnhandledExceptionFilter
lstrlenA
FreeEnvironmentStringsA
HeapCreate
GetEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
GetFileType
GetStdHandle
SetStdHandle
CloseHandle
WriteFile
HeapAlloc
SetFilePointer
HeapFree
FlushFileBuffers
wsprintfA
MessageBoxA
LoadStringA
OleInitialize
OleUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MethCallEngine
ord593
ord594
EVENT_SINK_AddRef
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord685
ord101
ord102
ord103
ord104
ord105
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE