DelHook
SetHook
Overview
overview
4Static
static
3�...jk.exe
windows7-x64
4�...jk.exe
windows10-2004-x64
4�...ss.dll
windows7-x64
3�...ss.dll
windows10-2004-x64
3�...ck.dll
windows7-x64
3�...ck.dll
windows10-2004-x64
3�...��.doc
windows7-x64
4�...��.doc
windows10-2004-x64
1�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Լأͥ棩v1.1/dnjk.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Լأͥ棩v1.1/dnjk.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Լأͥ棩v1.1/wincsrss.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Լأͥ棩v1.1/wincsrss.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Լأͥ棩v1.1/winsock.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Լأͥ棩v1.1/winsock.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Լأͥ棩v1.1/˵.doc
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Լأͥ棩v1.1/˵.doc
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Լأͥ棩v1.1/.url
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Լأͥ棩v1.1/.url
Resource
win10v2004-20240709-en
Target
3cbe92e52ead5d0b44b89e9edb962428_JaffaCakes118
Size
976KB
MD5
3cbe92e52ead5d0b44b89e9edb962428
SHA1
19c651954481f7071e9fd31f82a4ff2c94d570f5
SHA256
d024bb94ac8e4c5f24272a070e5c3ef0d7fd2c2fe11171c44c06cfa16fba1235
SHA512
14e8e988d40bcd6223428f70ff10c3341ec8cbd3aa268beb360f7478cde619ba9afa92ce9a8775be2e4c34885fdc5cacd645db16d01f7000f9410f73701b7584
SSDEEP
24576:x/MnCfL0vLCjn9TkwgR0hjvOZQJtKqeXQfq1m0PWA:aI4vQCdCUqeGfm
Checks for missing Authenticode signature.
resource |
---|
unpack001/Լأͥ棩v1.1/dnjk.exe |
unpack001/Լأͥ棩v1.1/wincsrss.dll |
unpack001/Լأͥ棩v1.1/winsock.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DelHook
SetHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ