SchedServiceMain
ServiceMain
SvchostEntry_W32Time
abc
explore
Overview
overview
8Static
static
7Service.exe
windows7-x64
8Service.exe
windows10-2004-x64
8SysLive.exe
windows7-x64
1SysLive.exe
windows10-2004-x64
3pagefile.exe
windows7-x64
8pagefile.exe
windows10-2004-x64
8system.dll
windows7-x64
8system.dll
windows10-2004-x64
8�...��.exe
windows7-x64
8�...��.exe
windows10-2004-x64
8Behavioral task
behavioral1
Sample
Service.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Service.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
SysLive.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
SysLive.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
pagefile.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
pagefile.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
system.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
system.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
.exe
Resource
win10v2004-20240709-en
Target
7571d823158f44ff85b16b5e1a233134_JaffaCakes118
Size
292KB
MD5
7571d823158f44ff85b16b5e1a233134
SHA1
d17b6b546f2f0fe14322f7f7685da56d6c26083c
SHA256
197c02617da9a6621f856c1d725355484764a626881cd8343cbe5f426db8772d
SHA512
cad6b899ebf9f4c11ddbff20f0f580af052f3a865e13d949e40d6ea9026e38688a33159348da970af403224fb1b52b4364746f0ebcbdb9edd483474f53132e88
SSDEEP
6144:Bfy2bhtPXbMI+3CpCYeucGkENY3gfivJaOEnEe+gTnvbBbXb20j1vUqcDD:BfyqDPgI+ypCbok/bpeHvbBbXSy1v+D
resource | yara_rule |
---|---|
static1/unpack001/pagefile.pif | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Service.exe |
unpack001/SysLive.exe |
unpack001/pagefile.pif |
unpack002/out.upx |
unpack001/system.dll |
unpack001/.EXE |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalFree
MapViewOfFile
UnmapViewOfFile
GetVersionExA
CreateFileMappingA
CreateFileA
GlobalAlloc
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
GetSystemTime
lstrcatA
DeviceIoControl
lstrcatW
GetSystemDirectoryW
lstrcmpiW
GetModuleFileNameW
WriteFile
IsBadWritePtr
LockResource
SizeofResource
LoadResource
FindResourceA
lstrlenW
FreeLibrary
CreateFileW
HeapFree
lstrcpynA
HeapAlloc
GetProcessHeap
lstrcmpiA
DuplicateHandle
TerminateJobObject
AssignProcessToJobObject
CreateJobObjectA
LoadLibraryExA
lstrcpyA
Sleep
WaitForSingleObject
SetFileAttributesA
SetEndOfFile
SetFilePointer
CopyFileA
FlushFileBuffers
RemoveDirectoryA
GetDriveTypeA
GetLogicalDriveStringsA
InterlockedExchange
GetTempPathA
GetTickCount
GlobalFree
OpenProcess
GetStartupInfoA
CreateProcessA
GetCurrentProcess
GetCurrentThreadId
CreateEventA
GetLastError
GetModuleFileNameA
lstrlenA
GetSystemDirectoryA
LoadLibraryA
CreateThread
CloseHandle
LoadLibraryW
GetProcAddress
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcpyW
ExitProcess
VirtualQuery
wsprintfW
wsprintfA
GetInputState
PostThreadMessageA
PeekMessageA
CloseServiceHandle
DeleteService
OpenSCManagerA
OpenServiceA
CreateServiceA
StartServiceA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
CreateProcessAsUserA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
LookupAccountSidA
GetTokenInformation
SetServiceStatus
RegisterServiceCtrlHandlerW
ControlService
RtlInitUnicodeString
RtlUnwind
NtQuerySystemInformation
NtQueryObject
RtlEqualUnicodeString
SchedServiceMain
ServiceMain
SvchostEntry_W32Time
abc
explore
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__vbaVarSub
ord690
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
__vbaStrVarMove
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
__vbaNextEachVar
__vbaFreeObjList
_adj_fprem1
ord518
__vbaStrCat
ord660
__vbaStrDate
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaAryDestruct
__vbaExitProc
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
__vbaFpR4
__vbaBoolVarNull
_CIsin
__vbaVarZero
__vbaChkstk
EVENT_SINK_AddRef
__vbaGenerateBoundsError
__vbaStrCmp
__vbaVarTstEq
__vbaDateR8
__vbaObjVar
__vbaI2I4
DllFunctionCall
__vbaVarOr
_adj_fpatan
__vbaR4Var
__vbaRedim
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
__vbaDateStr
_adj_fprem
_adj_fdivr_m64
ord716
__vbaFPException
__vbaStrVarVal
__vbaVarCat
ord534
__vbaI2Var
_CIlog
__vbaErrorOverflow
__vbaNew2
__vbaVarLateMemCallLdRf
__vbaR8Str
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
__vbaVarNot
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaVarTstNe
__vbaVarSetVar
__vbaI4Var
ord689
ord610
__vbaAryLock
__vbaVarAdd
__vbaLateMemCall
ord612
__vbaVarDup
__vbaStrToAnsi
__vbaFpI2
__vbaFpI4
__vbaVarLateMemCallLd
__vbaVarCopy
_CIatan
__vbaStrMove
ord619
__vbaForEachVar
_allmul
_CItan
ord546
__vbaAryUnlock
_CIexp
__vbaFreeObj
__vbaFreeStr
ord580
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE