DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Overview
overview
3Static
static
3cvery.comd....1.dll
windows7-x64
1cvery.comd....1.dll
windows10-2004-x64
1cvery.comd...ma.dll
windows7-x64
1cvery.comd...ma.dll
windows10-2004-x64
1cvery.comd...ma.dll
windows7-x64
1cvery.comd...ma.dll
windows10-2004-x64
1cvery.comd...ma.exe
windows7-x64
3cvery.comd...ma.exe
windows10-2004-x64
3cvery.comd...er.chm
windows7-x64
1cvery.comd...er.chm
windows10-2004-x64
1cvery.comd...ma.dll
windows7-x64
1cvery.comd...ma.dll
windows10-2004-x64
1cvery.comd...or.exe
windows7-x64
1cvery.comd...or.exe
windows10-2004-x64
1cvery.comd...ll.txt
windows7-x64
1cvery.comd...ll.txt
windows10-2004-x64
1cvery.comd...om.exe
windows7-x64
1cvery.comd...om.exe
windows10-2004-x64
1cvery.comd...GO.exe
windows7-x64
1cvery.comd...GO.exe
windows10-2004-x64
1cvery.comd...ou.url
windows7-x64
1cvery.comd...ou.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
cvery.comdel06011434242343/Com/SeekEngineIntf/DemogodyouStudio_Xiaolei_Neotoma.dll.1.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cvery.comdel06011434242343/Com/SeekEngineIntf/DemogodyouStudio_Xiaolei_Neotoma.dll.1.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
cvery.comdel06011434242343/Com/SeekEngineIntf/Xiaolei_Neotoma.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
cvery.comdel06011434242343/Com/SeekEngineIntf/Xiaolei_Neotoma.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
cvery.comdel06011434242343/Neotoma.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
cvery.comdel06011434242343/Neotoma.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
cvery.comdel06011434242343/Neotoma.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
cvery.comdel06011434242343/Neotoma.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
cvery.comdel06011434242343/NeotomaHelpCenter.chm
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
cvery.comdel06011434242343/NeotomaHelpCenter.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
cvery.comdel06011434242343/Registor/Neotoma.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
cvery.comdel06011434242343/Registor/Neotoma.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
cvery.comdel06011434242343/Registor/Registor.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
cvery.comdel06011434242343/Registor/Registor.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
cvery.comdel06011434242343/Temp/NeotomaCall.txt
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
cvery.comdel06011434242343/Temp/NeotomaCall.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
cvery.comdel06011434242343/Tools/ChatRoom.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
cvery.comdel06011434242343/Tools/ChatRoom.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
cvery.comdel06011434242343/Tools/LOGO.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
cvery.comdel06011434242343/Tools/LOGO.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
cvery.comdel06011434242343/Welcome to you.url
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
cvery.comdel06011434242343/Welcome to you.url
Resource
win10v2004-20240709-en
Target
45088e041ff040ceacae4bfe41ee2e8f_JaffaCakes118
Size
2.8MB
MD5
45088e041ff040ceacae4bfe41ee2e8f
SHA1
3c076e6b556df566a4389115b6a75c4cac49bc73
SHA256
45cc6d2c70241d76da2a214b5dbaeb8e79f85c2ef791ae88e17cf6c8901f2a3f
SHA512
c3867a1103d77822dea662a507839a3fb9cdfbec54aad825c152e0411c5ffe2a5682b83b23e4974101374bc9f219c2654d383e244a190dc614efe8ca1cc3040d
SSDEEP
49152:cXM4KcegH3La9rQFX9ik3pTuo2BM4nRTcwaTtVKXd/zf58hyBJN2WbXLJxE:204Cr+buoaM41cXEdtSyBrTLw
Checks for missing Authenticode signature.
resource |
---|
unpack001/cvery.comdel06011434242343/Com/SeekEngineIntf/DemogodyouStudio_Xiaolei_Neotoma.dll.1.0 |
unpack001/cvery.comdel06011434242343/Com/SeekEngineIntf/Xiaolei_Neotoma.dll |
unpack001/cvery.comdel06011434242343/Neotoma.dll |
unpack001/cvery.comdel06011434242343/Neotoma.exe |
unpack001/cvery.comdel06011434242343/Registor/Neotoma.dll |
unpack001/cvery.comdel06011434242343/Registor/Registor.exe |
unpack001/cvery.comdel06011434242343/Tools/ChatRoom.exe |
unpack001/cvery.comdel06011434242343/Tools/LOGO.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetHDSerialNumber
OK_SN_PartFour
OK_SN_PartOne
OK_SN_PartThree
OK_SN_PartTwo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetHDSerialNumber
OK_SN_PartFour
OK_SN_PartOne
OK_SN_PartThree
OK_SN_PartTwo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ