SetExceptionReport
SetSoftwareName
Overview
overview
7Static
static
7a/�...on.dll
windows7-x64
1a/�...on.dll
windows10-2004-x64
1a/�...ht.dll
windows7-x64
1a/�...ht.dll
windows10-2004-x64
1a/�...ch.dll
windows7-x64
1a/�...ch.dll
windows10-2004-x64
1a/�...ok.dll
windows7-x64
1a/�...ok.dll
windows10-2004-x64
1a/�...ib.vbs
windows7-x64
1a/�...ib.vbs
windows10-2004-x64
1a/�...ib.vbs
windows7-x64
1a/�...ib.vbs
windows10-2004-x64
1a/�...j1.exe
windows7-x64
7a/�...j1.exe
windows10-2004-x64
7a/�...F5.exe
windows7-x64
3a/�...F5.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
a/Fnew/BException.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a/Fnew/BException.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
a/Fnew/BException_cht.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
a/Fnew/BException_cht.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
a/Fnew/QMDispatch.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
a/Fnew/QMDispatch.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
a/Fnew/hook.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
a/Fnew/hook.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
a/Fnew/script/stdlib.vbs
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
a/Fnew/script/stdlib.vbs
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
a/Fnew/stdlib.vbs
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
a/Fnew/stdlib.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
a/Fnew/@ΰؽj1.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
a/Fnew/@ΰؽj1.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
a/Fnew/F5.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
a/Fnew/F5.exe
Resource
win10v2004-20240709-en
Target
42e1a5671412f19377c3619aa21f3fb3_JaffaCakes118
Size
715KB
MD5
42e1a5671412f19377c3619aa21f3fb3
SHA1
e19ee53bac4117d32e059ee364e6d24f5637854f
SHA256
63e17688dcf6c81a47b77c9db32b70f5ba83c6f1bf9dee72f6ef932cccd6a01f
SHA512
344e507b57003ada78bedc4f4b8899c1649ccedf900771dc9ba736ab010e3b6b3d8a70d609a32d3312702f31f07e3672d96441fa6a0b8b95dbe7dfe3f34f38ec
SSDEEP
12288:7VRZb6r9IEifBCY12PZ+7zupsTRrGikG79RvkjpxPtuC4wmB9zgojki46TT2BqE:tbeTLPonuaRr6GT6puv37in
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/a/Fnew/BException.dll | acprotect |
static1/unpack001/a/Fnew/BException_cht.dll | acprotect |
static1/unpack001/a/Fnew/QMDispatch.dll | acprotect |
Checks for missing Authenticode signature.
resource |
---|
unpack001/a/Fnew/BException.dll |
unpack001/a/Fnew/BException_cht.dll |
unpack001/a/Fnew/QMDispatch.dll |
unpack001/a/Fnew/hook.dll |
unpack001/a/Fnew/@ΰؽj1.EXE |
unpack001/a/Fnew/F5.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetExceptionReport
SetSoftwareName
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetExceptionReport
SetSoftwareName
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ResetEvent
PulseEvent
CreateEventA
WaitForSingleObject
RtlUnwind
OpenEventA
SetEvent
CloseHandle
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetFileAttributesA
GetFileType
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
VirtualAlloc
HeapReAlloc
SetStdHandle
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
FlushFileBuffers
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
UnhookWindowsHookEx
SetWindowsHookExA
GetKeyState
GetCursorPos
SendMessageA
PostMessageA
CallNextHookEx
keybd_event
GetPixel
DeleteDC
CreateDCA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
MessageBoxA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE