InjectDll
UnmapDll
Overview
overview
6Static
static
3VLPro667_C...Pr.dll
windows7-x64
1VLPro667_C...Pr.dll
windows10-2004-x64
1VLPro667_C...tn.dll
windows7-x64
1VLPro667_C...tn.dll
windows10-2004-x64
3VLPro667_C...Pr.chm
windows7-x64
1VLPro667_C...Pr.chm
windows10-2004-x64
1VLPro667_C...Pr.exe
windows7-x64
6VLPro667_C...Pr.exe
windows10-2004-x64
6Static task
static1
Behavioral task
behavioral1
Sample
VLPro667_CR/HookPr.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
VLPro667_CR/HookPr.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
VLPro667_CR/OhmRetn.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
VLPro667_CR/OhmRetn.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
VLPro667_CR/VLAutoPr.chm
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
VLPro667_CR/VLAutoPr.chm
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
VLPro667_CR/VLAutoPr.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
VLPro667_CR/VLAutoPr.exe
Resource
win10v2004-20240704-en
Target
2df81dab5b3ad2fe747f36312cbcc4b5_JaffaCakes118
Size
347KB
MD5
2df81dab5b3ad2fe747f36312cbcc4b5
SHA1
b6270303bb3d1cb98f1ed90680bf61867a2a0720
SHA256
9226b29977c2db4a8c749e58b104eaf6a641e56f485b592cd57618f649e7efb1
SHA512
70c00b68923b9d85a5bc745d300e78a4ba6f7f5e282ef6e823e028281516edab26aecdae270ec717078bf328407186b16d3ba6ef174166252b43af6983a5e866
SSDEEP
6144:2WR4hF2bMQQ/Jj6ej5RrsD2C5u2/qHg/hPnb+RMCLYbJMTL6zYiyOoxxYCp+LhZt:2EQ2S4eM2C8o3nb2pcqTL6zWjY96ZU9
Checks for missing Authenticode signature.
resource |
---|
unpack001/VLPro667_CR/HookPr.dll |
unpack001/VLPro667_CR/OhmRetn.dll |
unpack001/VLPro667_CR/VLAutoPr.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
InjectDll
UnmapDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
wsprintfA
GetId
GetProcAddress
Inject
LoadLibraryA
MessageBoxA
UnMap
VirtualAlloc
VirtualFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
PlaySoundW
InjectDll
InvalidateRgn
ExtSelectClipRgn
GetFileTitleW
ClosePrinter
RegEnumKeyW
Shell_NotifyIconW
InitCommonControlsEx
PathFindFileNameW
OleUIBusyW
CoTaskMemFree
SysStringLen
closesocket
GetModuleBaseNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE