DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Overview
overview
3Static
static
32006917191...��.url
windows7-x64
12006917191...��.url
windows10-2004-x64
12006917191...��.exe
windows7-x64
12006917191...��.exe
windows10-2004-x64
1NTServ.exe
windows7-x64
1NTServ.exe
windows10-2004-x64
1basRegistry.vbs
windows7-x64
1basRegistry.vbs
windows10-2004-x64
1basService.vbs
windows7-x64
1basService.vbs
windows10-2004-x64
1frmMain.vbs
windows7-x64
1frmMain.vbs
windows10-2004-x64
12006917191...��.vbs
windows7-x64
12006917191...��.vbs
windows10-2004-x64
12006917191...��.vbs
windows7-x64
12006917191...��.vbs
windows10-2004-x64
12006917191...��.vbs
windows7-x64
12006917191...��.vbs
windows10-2004-x64
12006917191...��.vbs
windows7-x64
12006917191...��.vbs
windows10-2004-x64
12006917191...��.exe
windows7-x64
12006917191...��.exe
windows10-2004-x64
12006917191...��.exe
windows7-x64
12006917191...��.exe
windows10-2004-x64
12006917191...��.dll
windows7-x64
12006917191...��.dll
windows10-2004-x64
12006917191...��.url
windows7-x64
12006917191...��.url
windows10-2004-x64
12006917191...��.url
windows7-x64
12006917191...��.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
200691719181653/免费『商业源码』.url
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
200691719181653/免费『商业源码』.url
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.exe
Resource
win10v2004-20240708-en
Behavioral task
behavioral5
Sample
NTServ.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
NTServ.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
basRegistry.vbs
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
basRegistry.vbs
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
basService.vbs
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
basService.vbs
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
frmMain.vbs
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
frmMain.vbs
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.vbs
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.vbs
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.vbs
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.vbs
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.vbs
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.vbs
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.vbs
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.vbs
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.exe
Resource
win10v2004-20240708-en
Behavioral task
behavioral23
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.dll
Resource
win10v2004-20240708-en
Behavioral task
behavioral27
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.url
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系.url
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
200691719181653/新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
200691719181653/新云软件.url
Resource
win10v2004-20240704-en
Target
2e68b3cbbef3523f1141fcec747ef731_JaffaCakes118
Size
95KB
MD5
2e68b3cbbef3523f1141fcec747ef731
SHA1
082d624bd4a911f7a59d354ea146b84201bbd0c6
SHA256
81e64b9b314273d5270b91c1e2e76e0affc26c97a5da6a21b3be5d28e15167b7
SHA512
8f69b2efa0345b37a3bbbbf3f015c60ceba486024482fada4466e28363536f01c1b657260fda817ecd9370eee1811050958643dd998da18714bdbad506e0b08b
SSDEEP
1536:QJjpvqhjw1bLik7XBnTmG0UpIu9Kt+ah48ju0j38CoCiM6fn/n+OTJw56anSGpa4:CjpvKM1npRnqG0Pu9KtH48CXlCiM6fn+
Checks for missing Authenticode signature.
resource |
---|
unpack001/200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系统服务 2)移除一个系统服务 3)检查一系统服务是否安装 4)检查一服务是否运行/API Calls/NTServ.exe |
unpack002/NTServ.exe |
unpack001/200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系统服务 2)移除一个系统服务 3)检查一系统服务是否安装 4)检查一服务是否运行/Microsoft/SAMPLE/sample.exe |
unpack001/200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系统服务 2)移除一个系统服务 3)检查一系统服务是否安装 4)检查一服务是否运行/OCX Calls/ServTest.exe |
unpack001/200691719181653/微软官方提供的如何使用VBVC编程,做到:1)将一个程序设置成系统服务 2)移除一个系统服务 3)检查一系统服务是否安装 4)检查一服务是否运行/ntsvc.ocx |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__vbaVarSub
_CIcos
_adj_fptan
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
__vbaLenBstr
__vbaStrVarMove
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
ord516
__vbaStrErrVarCopy
_adj_fprem1
ord518
__vbaRecAnsiToUni
__vbaResume
__vbaStrCat
__vbaError
__vbaLsetFixstr
ord660
__vbaSetSystemError
__vbaRecDestruct
__vbaHresultCheckObj
ord558
__vbaLenVar
__vbaVargVarCopy
_adj_fdiv_m32
__vbaAryDestruct
__vbaExitProc
__vbaStrBool
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
ord520
__vbaBoolVarNull
_CIsin
ord632
__vbaVargVarMove
__vbaChkstk
ord526
EVENT_SINK_AddRef
ord528
__vbaGenerateBoundsError
__vbaStrCmp
__vbaVarTstEq
__vbaI2I4
DllFunctionCall
__vbaVarOr
_adj_fpatan
__vbaFixstrConstruct
__vbaRedim
__vbaRecUniToAnsi
EVENT_SINK_Release
__vbaNew
_CIsqrt
EVENT_SINK_QueryInterface
__vbaUI1I4
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
_adj_fdivr_m64
ord607
ord608
__vbaFPException
__vbaInStrVar
__vbaStrVarVal
__vbaVarCat
ord537
ord645
_CIlog
__vbaErrorOverflow
__vbaInStr
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
ord573
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
__vbaI4Var
__vbaVarCmpEq
__vbaAryLock
__vbaVarDup
__vbaStrToAnsi
__vbaVarCopy
ord616
ord617
__vbaRecDestructAnsi
_CIatan
__vbaStrMove
_allmul
_CItan
__vbaAryUnlock
_CIexp
__vbaFreeStr
__vbaFreeObj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__vbaVarSub
_CIcos
_adj_fptan
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
__vbaLenBstr
__vbaStrVarMove
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
ord516
__vbaStrErrVarCopy
_adj_fprem1
ord518
__vbaRecAnsiToUni
__vbaResume
__vbaStrCat
__vbaError
__vbaLsetFixstr
ord660
__vbaSetSystemError
__vbaRecDestruct
__vbaHresultCheckObj
ord558
__vbaLenVar
__vbaVargVarCopy
_adj_fdiv_m32
__vbaAryDestruct
__vbaExitProc
__vbaStrBool
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
ord520
__vbaBoolVarNull
_CIsin
ord632
__vbaVargVarMove
__vbaChkstk
ord526
EVENT_SINK_AddRef
ord528
__vbaGenerateBoundsError
__vbaStrCmp
__vbaVarTstEq
__vbaI2I4
DllFunctionCall
__vbaVarOr
_adj_fpatan
__vbaFixstrConstruct
__vbaRedim
__vbaRecUniToAnsi
EVENT_SINK_Release
__vbaNew
_CIsqrt
EVENT_SINK_QueryInterface
__vbaUI1I4
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
_adj_fdivr_m64
ord607
ord608
__vbaFPException
__vbaInStrVar
__vbaStrVarVal
__vbaVarCat
ord537
ord645
_CIlog
__vbaErrorOverflow
__vbaInStr
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
ord573
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
__vbaI4Var
__vbaVarCmpEq
__vbaAryLock
__vbaVarDup
__vbaStrToAnsi
__vbaVarCopy
ord616
ord617
__vbaRecDestructAnsi
_CIatan
__vbaStrMove
_allmul
_CItan
__vbaAryUnlock
_CIexp
__vbaFreeStr
__vbaFreeObj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CIcos
_adj_fptan
__vbaStrI4
__vbaFreeVar
__vbaStrVarMove
__vbaLateIdCall
__vbaFreeVarList
__vbaEnd
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaStrCat
ord660
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaExitProc
__vbaOnError
__vbaObjSet
ord595
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
__vbaBoolVar
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
__vbaVarTstEq
__vbaI2I4
ord670
__vbaCastObjVar
_adj_fpatan
__vbaLateIdCallLd
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaI2Str
__vbaFPException
__vbaStrVarVal
_CIlog
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
__vbaVarDup
_CIatan
__vbaStrMove
_allmul
__vbaLateIdSt
_CItan
ord546
_CIexp
__vbaFreeObj
__vbaFreeStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CIcos
_adj_fptan
__vbaFreeVar
__vbaLateIdCall
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaStrBool
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
__vbaBoolVar
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
_adj_fpatan
__vbaLateIdCallLd
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
_CIlog
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
_adj_fdivr_m32
_adj_fdiv_r
ord100
_CIatan
__vbaStrMove
_allmul
__vbaLateIdSt
_CItan
_CIexp
__vbaFreeObj
__vbaFreeStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord5150
ord3952
ord2724
ord6354
ord599
ord1216
ord1168
ord1243
ord1227
ord823
ord1877
ord4249
ord2486
ord2687
ord6364
ord3326
ord6365
ord4472
ord5498
ord3278
ord3353
ord3681
ord446
ord743
ord1177
ord1226
ord1210
ord3530
ord2439
ord1693
ord5618
ord994
ord4342
ord4687
ord4639
ord5674
ord2156
ord4856
ord4920
ord6002
ord2137
ord1963
ord5213
ord2953
ord561
ord825
ord4705
ord4707
ord2876
ord2998
ord5649
ord4113
ord4661
ord4660
ord4768
ord4650
ord4903
ord4548
ord4521
ord4594
ord4988
ord4925
ord4930
ord4935
ord4659
ord4909
ord4908
ord4668
ord4667
ord4666
ord4648
ord4689
ord5023
ord4654
ord4643
ord4354
ord4780
ord4649
ord4637
ord4636
ord5060
ord4584
ord4371
ord4361
ord4356
ord2976
ord4741
ord4738
ord4409
ord4603
ord3868
ord3670
ord4979
ord2488
ord3081
ord2985
ord2954
ord6055
ord4078
ord1776
ord4407
ord5241
ord2384
ord5163
ord6370
ord4353
ord5290
ord3798
ord815
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2983
ord3148
ord3260
ord4466
ord3269
ord2986
ord3080
ord4081
ord4624
ord5825
ord3571
ord3573
ord800
ord723
ord6004
ord1641
ord1146
ord860
ord2636
ord3946
ord540
ord423
ord640
ord5873
ord5785
ord1640
ord323
ord3626
ord3663
ord2414
ord2379
ord4992
ord5327
ord5333
ord537
ord5328
ord5314
ord5334
ord2541
ord4949
ord641
ord2514
ord324
ord6030
ord1601
ord2795
ord5572
ord2915
ord6262
ord539
ord861
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord3401
ord4415
ord5008
ord3262
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord3136
ord4465
ord3259
ord3404
ord4539
ord4739
ord4837
ord269
ord1131
ord1132
ord1116
ord1176
ord6412
ord1575
ord1577
ord1182
ord1197
ord1578
ord1255
ord1253
ord600
ord826
ord342
ord1570
malloc
_mbsnbcpy
__CxxFrameHandler
__dllonexit
_onexit
_adjust_fdiv
??1type_info@@UAE@XZ
vsprintf
_initterm
free
_EH_prolog
LocalAlloc
LocalFree
SetEvent
CloseHandle
CreateThread
GetModuleFileNameA
CreateEventA
WaitForSingleObject
OutputDebugStringA
GetCurrentThreadId
FillRect
GetSysColor
LoadBitmapA
DrawEdge
wsprintfA
PostMessageA
PostQuitMessage
EnableWindow
CreateCompatibleDC
BitBlt
GetObjectA
CreateSolidBrush
CreateBitmap
GetPixel
CreateServiceA
DeregisterEventSource
SetServiceStatus
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
RegCloseKey
RegSetValueExA
RegCreateKeyA
CloseServiceHandle
OpenSCManagerA
DeleteService
OpenServiceA
ReportEventA
RegisterEventSourceA
RegEnumValueA
RegOpenKeyA
RegDeleteKeyA
RegQueryValueExA
VariantInit
SafeArrayCreate
SafeArrayRedim
LoadRegTypeLi
SafeArrayPutElement
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ