InstallHook
SetUpHook
_HookProc@12
Overview
overview
8Static
static
7NTIllusion...on.dll
windows7-x64
3NTIllusion...on.dll
windows10-2004-x64
1NTIllusion...ew.exe
windows7-x64
8NTIllusion...ew.exe
windows10-2004-x64
8NTIllusion...er.exe
windows7-x64
1NTIllusion...er.exe
windows10-2004-x64
1NTIllusion...ct.exe
windows7-x64
1NTIllusion...ct.exe
windows10-2004-x64
1NTIllusion...px.exe
windows7-x64
7NTIllusion...px.exe
windows10-2004-x64
7NTIllusion...LL.bat
windows7-x64
7NTIllusion...LL.bat
windows10-2004-x64
7NTIllusion...ib.vbs
windows7-x64
1NTIllusion...ib.vbs
windows10-2004-x64
1Behavioral task
behavioral1
Sample
NTIllusion/Release/kNTIllusion.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
NTIllusion/Release/kNTIllusion.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
NTIllusion/Release/tools/Dbgview.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
NTIllusion/Release/tools/Dbgview.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
NTIllusion/Release/tools/kNtiLoader.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
NTIllusion/Release/tools/kNtiLoader.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
NTIllusion/Release/tools/kinject.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
NTIllusion/Release/tools/kinject.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
NTIllusion/Release/tools/others/upx.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
NTIllusion/Release/tools/others/upx.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
NTIllusion/Release/tools/others/upxDLL.bat
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
NTIllusion/Release/tools/others/upxDLL.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
NTIllusion/Src/Core/Misc/kNTILib.vbs
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
NTIllusion/Src/Core/Misc/kNTILib.vbs
Resource
win10v2004-20240611-en
Target
160ac2efaea20e227daf95fa1702e179_JaffaCakes118
Size
339KB
MD5
160ac2efaea20e227daf95fa1702e179
SHA1
b3311fac40ba15f006aa80326e7b2a3a8056c254
SHA256
74621c120a2c53b78ae4872e0bded05a33f18ff6486696795c85435ad277ab8d
SHA512
b5046523ad3daaf5cc4e80918c1b3fac8d08fb6ddc7987721923198846d756b53941fec45674830c1de6fc87267f17a2f0ab78d56da8739a27a2e530e1f3fd86
SSDEEP
6144:8IwQZ1gDKQspgRvB3375yZbIVflFEdiWPCK34+Jb7tPcmNb+6hBC:9gDYgBB339GCKLCvydx4wc
resource | yara_rule |
---|---|
static1/unpack001/NTIllusion/Release/tools/others/upx.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/NTIllusion/Release/kNTIllusion.dll |
unpack001/NTIllusion/Release/tools/Dbgview.exe |
unpack001/NTIllusion/Release/tools/kNtiLoader.exe |
unpack001/NTIllusion/Release/tools/kinject.exe |
unpack001/NTIllusion/Release/tools/others/upx.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitProcess
GetProcAddress
GetModuleHandleA
FreeLibrary
LoadLibraryA
IsBadReadPtr
VirtualProtect
CloseHandle
ResumeThread
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
WideCharToMultiByte
GetModuleFileNameA
WriteFile
SetFilePointer
CreateFileA
ExpandEnvironmentStringsA
GetSystemTime
GetCurrentProcessId
LocalFree
FormatMessageA
GetLastError
GlobalFree
GlobalAlloc
TlsFree
TlsAlloc
HeapAlloc
HeapFree
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringA
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
RtlUnwind
GetOEMCP
GetStringTypeA
GetStringTypeW
wsprintfA
wvsprintfA
InstallHook
SetUpHook
_HookProc@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SizeofResource
LoadResource
FindResourceA
RaiseException
GetTickCount
GlobalReAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcatA
HeapFree
lstrcpyA
HeapAlloc
GetProcessHeap
GetTimeFormatA
DosDateTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileSize
GlobalFree
WriteFileEx
QueueUserAPC
SleepEx
SetEndOfFile
GetOEMCP
GetACP
GetCPInfo
SetStdHandle
LockResource
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FlushFileBuffers
LCMapStringW
LCMapStringA
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
UnhandledExceptionFilter
TerminateProcess
TlsGetValue
TlsAlloc
DeleteCriticalSection
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetModuleFileNameA
ExitProcess
GetStartupInfoA
InterlockedDecrement
ExitThread
TlsSetValue
CreateThread
ResumeThread
RtlUnwind
GetCurrentProcess
ReadFile
WaitForMultipleObjects
ResetEvent
WriteFile
GetOverlappedResult
GetVersion
GetCommandLineA
GetFullPathNameA
GetComputerNameA
GetCurrentProcessId
InitializeCriticalSection
lstrlenA
FindFirstFileA
SearchPathA
FindClose
GlobalMemoryStatus
LoadLibraryA
FreeLibrary
GetSystemDirectoryA
GetCurrentDirectoryA
CreateFileA
DeleteFileA
QueryPerformanceFrequency
DeviceIoControl
GetCurrentThreadId
CopyFileA
WaitForSingleObject
SetLastError
OpenMutexA
CreateMutexA
CreateFileMappingA
MapViewOfFile
CreateEventA
UnmapViewOfFile
GetSystemTime
SystemTimeToFileTime
QueryPerformanceCounter
SetEvent
InterlockedIncrement
CloseHandle
lstrcpynA
GetLastError
FormatMessageA
LocalFree
EnterCriticalSection
TerminateThread
LeaveCriticalSection
GetModuleHandleA
GetProcAddress
GetEnvironmentVariableA
SetFilePointer
CheckMenuItem
GetMenu
MessageBoxA
InsertMenuItemA
GetMenuItemCount
GetSubMenu
SetCursor
InvalidateRect
ChildWindowFromPoint
GetSysColor
GetSysColorBrush
LoadCursorA
GetDlgItem
EndDialog
ShowWindow
SetWindowTextA
CloseClipboard
SetClipboardData
EmptyClipboard
BeginPaint
DrawTextA
GetFocus
PostQuitMessage
OpenClipboard
GetMenuCheckMarkDimensions
GetDC
GetWindowTextA
LoadIconA
SendMessageA
GetSystemMetrics
ClientToScreen
ScreenToClient
GetDialogBaseUnits
DrawFocusRect
GetParent
IsDlgButtonChecked
PostMessageA
CheckRadioButton
RegisterClassExA
FindWindowA
LoadAcceleratorsA
RegisterWindowMessageA
PeekMessageA
MsgWaitForMultipleObjects
TranslateAcceleratorA
IsWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
GetMessageA
CallWindowProcA
GetWindowThreadProcessId
SetWindowLongA
EnableWindow
CheckDlgButton
ReleaseDC
CreateWindowExA
UpdateWindow
RegisterClassA
LoadBitmapA
SetTimer
ModifyMenuA
MoveWindow
KillTimer
DefWindowProcA
LoadStringA
SetWindowPos
InvalidateRgn
CreateDialogParamA
GetClientRect
GetCursorPos
DestroyWindow
SetForegroundWindow
TrackPopupMenu
SetDlgItemTextA
SendDlgItemMessageA
AttachThreadInput
AppendMenuA
SetMenuItemBitmaps
DialogBoxParamA
SetFocus
GetDlgItemTextA
SetCapture
ReleaseCapture
EnableMenuItem
DeleteMenu
GetWindowRect
IsIconic
IsZoomed
EndPaint
GetTextExtentPointA
StartDocA
GetDeviceCaps
CreateFontA
StartPage
TextOutA
EndPage
AbortDoc
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectA
GetObjectA
GetStockObject
DeleteDC
StretchBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
GetTextMetricsA
DeleteObject
SetBkColor
ExtTextOutA
GetTextExtentPoint32A
SetAbortProc
EndDoc
closesocket
WSAGetLastError
connect
socket
gethostbyname
htons
htonl
bind
getsockname
listen
accept
WSAStartup
inet_addr
gethostbyaddr
WNetCancelConnection2A
WNetAddConnection2A
ord17
CreateToolbarEx
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
FindTextA
PrintDlgA
ChooseFontA
RegOpenKeyExA
OpenSCManagerA
DeleteService
ControlService
OpenServiceA
StartServiceA
QueryServiceStatus
CreateServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
SHGetMalloc
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
SHGetSpecialFolderLocation
SHBrowseForFolderA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetStdHandle
GetProcAddress
LoadLibraryA
OutputDebugStringA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
Sleep
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseHandle
CreateProcessA
CreateRemoteThread
ExitProcess
FreeLibrary
GetCurrentProcess
GetLastError
GetModuleHandleA
GetProcAddress
LoadLibraryA
OpenProcess
SetUnhandledExceptionFilter
Sleep
VirtualAllocEx
WaitForSingleObject
WriteProcessMemory
__getmainargs
__p__environ
__set_app_type
_cexit
_fileno
_fmode
_fpreset
_iob
_setmode
atexit
atol
getchar
memset
printf
signal
strcmp
strlen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE