GetASTUnpackFun
GetASTUnpackFunArray
GetStaticUnpackFun
GetUnpackFun
InitVM
SetOEPCallBack
Overview
overview
7Static
static
7FFI/FFI.exe
windows7-x64
7FFI/FFI.exe
windows10-2004-x64
7FFI/Office.dll
windows7-x64
1FFI/Office.dll
windows10-2004-x64
1FFI/VUnpackSDK.dll
windows7-x64
7FFI/VUnpackSDK.dll
windows10-2004-x64
7FFI/Vista.dll
windows7-x64
1FFI/Vista.dll
windows10-2004-x64
1FFI/unarc.dll
windows7-x64
7FFI/unarc.dll
windows10-2004-x64
7FFI/新云软件.url
windows7-x64
1FFI/新云软件.url
windows10-2004-x64
1Behavioral task
behavioral1
Sample
FFI/FFI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
FFI/FFI.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
FFI/Office.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
FFI/Office.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
FFI/VUnpackSDK.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
FFI/VUnpackSDK.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
FFI/Vista.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
FFI/Vista.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
FFI/unarc.dll
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
FFI/unarc.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
FFI/新云软件.url
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
FFI/新云软件.url
Resource
win10v2004-20240508-en
Target
1b4d13ac224cb5f82d144ef0c2155bb6_JaffaCakes118
Size
1.1MB
MD5
1b4d13ac224cb5f82d144ef0c2155bb6
SHA1
17ac8b5a14bc1edae6b12b40e4289511ea0a7499
SHA256
bf17fb5db5b872bf665deb4abcd87ebff70c1e5bdb9d189e8dfe1a8f55eedb30
SHA512
1e6f2fb483db28373b6185f8556157ba7e34fea5a7d315cf143a2f4ea14fbd4b82b6771b6aa4ae8a9c353215f832fc297b31ae914a077e0fa2d57bffaf6e7578
SSDEEP
24576:xLwX/VtL3XKMX5ZMCfmIphOreuTmWzpIG6L+moEBHkXT3OiGSOHBS3i4+g8eg:mX/VJpXkCjzOreu6WFm+mrBEXLOlSi0G
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/FFI/VUnpackSDK.dll | acprotect |
static1/unpack001/FFI/unarc.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/FFI/VUnpackSDK.dll | upx |
static1/unpack001/FFI/unarc.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/FFI/FFI.exe |
unpack001/FFI/Office.cjstyles |
unpack001/FFI/VUnpackSDK.dll |
unpack001/FFI/Vista.cjstyles |
unpack001/FFI/unarc.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapAlloc
HeapReAlloc
HeapFree
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
SetStdHandle
GetFileType
HeapSize
GetACP
IsValidCodePage
GetStdHandle
VirtualFree
HeapDestroy
HeapCreate
GetDriveTypeA
GetTimeZoneInformation
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
WideCharToMultiByte
GetTickCount
GetCurrentDirectoryA
GetFileTime
GetFileAttributesA
SetErrorMode
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
LocalSize
LoadLibraryExW
LoadLibraryExA
LoadLibraryW
InitializeCriticalSection
WritePrivateProfileStringA
WaitForSingleObject
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FindNextFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetThreadLocale
GlobalFree
GlobalAlloc
FormatMessageA
LocalFree
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
GlobalLock
GlobalUnlock
MulDiv
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
ReadFile
GetFileSize
TerminateProcess
OpenThread
Thread32Next
Thread32First
FileTimeToLocalFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
WriteProcessMemory
Module32Next
Module32First
ReadProcessMemory
Process32Next
OpenProcess
Process32First
VirtualFreeEx
CreateToolhelp32Snapshot
VirtualAllocEx
VirtualQueryEx
CreateFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSizeEx
GetVersion
lstrlenA
InterlockedExchange
CompareStringA
CompareStringW
MultiByteToWideChar
Sleep
DeleteFileA
CreateProcessA
FreeLibrary
GetCommandLineA
GetProcAddress
GetModuleHandleA
LoadLibraryA
GetLastError
SetLastError
GetModuleFileNameA
CloseHandle
CreateThread
GetCurrentProcess
FindResourceA
LoadResource
LockResource
SizeofResource
SetHandleCount
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableA
CharNextA
SetRect
MessageBeep
DestroyIcon
ReleaseCapture
SetCapture
UnregisterClassA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
DestroyMenu
InflateRect
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetNextDlgGroupItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetWindowLongA
SendMessageA
InvalidateRect
EnableWindow
SetCursor
GetClientRect
LoadCursorA
IsWindowEnabled
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
RegisterClipboardFormatA
SetTimer
KillTimer
FillRect
PostThreadMessageA
GetWindowRect
GetCursorPos
CreatePopupMenu
AppendMenuA
LoadIconA
GetSystemMenu
EnableMenuItem
IsIconic
GetSystemMetrics
DrawIcon
RegisterWindowMessageA
CharUpperA
wsprintfA
GetWindow
GetWindowPlacement
SystemParametersInfoA
IntersectRect
LoadImageA
CreateIconIndirect
CopyIcon
GetIconInfo
GetDoubleClickTime
DrawFocusRect
SetClassLongA
SetWindowRgn
LoadStringA
DrawStateA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetScrollPos
GetScrollPos
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
ScreenToClient
EqualRect
CopyRect
GetScrollInfo
SetScrollInfo
DrawIconEx
SendMessageTimeoutA
GetFocus
DrawFrameControl
DrawEdge
RegisterClassW
DefMDIChildProcW
DefMDIChildProcA
DefDlgProcW
DefDlgProcA
DefFrameProcW
DefFrameProcA
DefWindowProcW
CallWindowProcW
EnableScrollBar
EnumWindows
IsWindowUnicode
GetWindowLongW
SetWindowLongW
OffsetRect
SetWindowPos
GetWindowLongA
CallWindowProcA
DefWindowProcA
GetDlgCtrlID
PtInRect
SetRectEmpty
CombineRgn
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
CreateCompatibleBitmap
GetTextExtentPoint32A
CreateFontIndirectA
PatBlt
CreateRectRgnIndirect
CreateSolidBrush
CreatePen
GetDeviceCaps
GetObjectType
SelectPalette
GetStockObject
CreateCompatibleDC
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
DeleteObject
ExcludeClipRect
SetMapMode
SetStretchBltMode
CreateFontA
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
OffsetRgn
GetTextCharsetInfo
StretchBlt
CreateDIBSection
SetBrushOrgEx
CreatePalette
CreateDIBitmap
Polygon
GetDIBits
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SaveDC
RestoreDC
SetBkMode
SetViewportExtEx
GetFileTitleA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteKeyA
RegEnumValueA
RegDeleteValueA
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
RegOpenKeyExA
DragFinish
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
DragQueryFileA
_TrackMouseEvent
InitCommonControlsEx
FlatSB_GetScrollProp
ImageList_GetBkColor
ImageList_GetImageInfo
ImageList_DrawIndirect
ImageList_GetIconSize
ImageList_Destroy
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
ord8
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoCreateInstance
CoDisconnectObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoGetClassObject
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
SysStringByteLen
VariantCopy
SafeArrayDestroy
OleCreateFontIndirect
SysAllocString
LoadTypeLi
EnumProcessModules
GetModuleFileNameExA
gethostbyname
WSAGetLastError
socket
closesocket
WSAStartup
send
recv
htons
connect
WSACleanup
ImageDirectoryEntryToData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetASTUnpackFun
GetASTUnpackFunArray
GetStaticUnpackFun
GetUnpackFun
InitVM
SetOEPCallBack
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadUnarcCom
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE