SetMask
myTest
testFunc
vcAlpha
vcFade
vcStrech
Overview
overview
6Static
static
3BACKUPME.bat
windows7-x64
1BACKUPME.bat
windows10-2004-x64
1DEBUG.vbs
windows7-x64
1DEBUG.vbs
windows10-2004-x64
1DXClipCTRL.vbs
windows7-x64
1DXClipCTRL.vbs
windows10-2004-x64
1DXFightCTRL.vbs
windows7-x64
1DXFightCTRL.vbs
windows10-2004-x64
1DXGame.dll
windows7-x64
3DXGame.dll
windows10-2004-x64
3DXInput.vbs
windows7-x64
1DXInput.vbs
windows10-2004-x64
1DXMovie2CTRL.vbs
windows7-x64
1DXMovie2CTRL.vbs
windows10-2004-x64
1DXMovieCTRL.vbs
windows7-x64
1DXMovieCTRL.vbs
windows10-2004-x64
1DXMovieStruct.vbs
windows7-x64
1DXMovieStruct.vbs
windows10-2004-x64
1DXScreen.vbs
windows7-x64
1DXScreen.vbs
windows10-2004-x64
1DXScreen.vbs
windows7-x64
1DXScreen.vbs
windows10-2004-x64
1DXSfcCTRL.vbs
windows7-x64
1DXSfcCTRL.vbs
windows10-2004-x64
1DXSound.vbs
windows7-x64
1DXSound.vbs
windows10-2004-x64
1DXStoryCTRL.vbs
windows7-x64
1DXStoryCTRL.vbs
windows10-2004-x64
1DXWordCTRL.vbs
windows7-x64
1DXWordCTRL.vbs
windows10-2004-x64
1LOADER.exe
windows7-x64
6LOADER.exe
windows10-2004-x64
6Static task
static1
Behavioral task
behavioral1
Sample
BACKUPME.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
BACKUPME.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
DEBUG.vbs
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
DEBUG.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
DXClipCTRL.vbs
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
DXClipCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
DXFightCTRL.vbs
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
DXFightCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
DXGame.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
DXGame.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
DXInput.vbs
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
DXInput.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
DXMovie2CTRL.vbs
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
DXMovie2CTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
DXMovieCTRL.vbs
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
DXMovieCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
DXMovieStruct.vbs
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
DXMovieStruct.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
DXScreen.vbs
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
DXScreen.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
DXScreen.vbs
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
DXScreen.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
DXSfcCTRL.vbs
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
DXSfcCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
DXSound.vbs
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
DXSound.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
DXStoryCTRL.vbs
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
DXStoryCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
DXWordCTRL.vbs
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
DXWordCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
LOADER.exe
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
LOADER.exe
Resource
win10v2004-20240802-en
Target
aed3655ff961f54a06220771fba076cf_JaffaCakes118
Size
20.1MB
MD5
aed3655ff961f54a06220771fba076cf
SHA1
e9d0e8b9e2290df0eb297922d6a98f82e58196f4
SHA256
455a31e3e5847bc5cf198d1bd527885a7998b3887c44bba24fbc2c898d2d41a4
SHA512
1627fb8de36bb010f9b4ec0be177e95591225d4f6d077f1277b627fb2696c0b08e5d3d5ea73a262a11454e3a1086ee9595f7447db893ca85e4c5e2f59c5df3be
SSDEEP
393216:K53zn1IssDf454/rPu7MrhdtLf5baZ/DLRxGof2kr3TRsGIDziK64IyQw:Kd1k4APHhd2Z/D90of/yDziHw
Checks for missing Authenticode signature.
resource |
---|
unpack002/DXGame.dll |
unpack002/LOADER.EXE |
unpack002/MOVIE.EXE |
unpack002/SEIYA.EXE |
unpack001/155011551/seiya.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord17
GetCommandLineA
RtlUnwind
TerminateProcess
HeapFree
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
ExitProcess
FreeEnvironmentStringsA
LoadLibraryA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
WriteFile
GetCurrentProcess
GetOEMCP
GetCPInfo
GetProcessVersion
MultiByteToWideChar
WideCharToMultiByte
WritePrivateProfileStringA
InterlockedDecrement
FreeLibrary
FreeEnvironmentStringsW
lstrcmpA
GetCurrentThread
lstrcmpiA
GlobalGetAtomNameA
GetVersion
lstrcatA
lstrcpyA
GlobalAddAtomA
GlobalFindAtomA
LocalReAlloc
GetLastError
TlsGetValue
GlobalReAlloc
TlsSetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
TlsFree
InitializeCriticalSection
DeleteCriticalSection
TlsAlloc
GlobalFlags
LocalFree
LocalAlloc
lstrcpynA
GlobalFree
lstrlenA
GetModuleHandleA
GlobalUnlock
GetProcAddress
SetLastError
GetEnvironmentStrings
GetEnvironmentStringsW
GetStartupInfoA
GetCurrentThreadId
GetMenu
GetClassInfoA
wsprintfA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
ShowWindow
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
GetMenuItemID
GetDlgItem
DefWindowProcA
GetMenuItemCount
RegisterClassA
GetClassLongA
SetPropA
GetSubMenu
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindowTextA
SetWindowTextA
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
DestroyWindow
CreateWindowExA
UnhookWindowsHookEx
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
SetWindowsHookExA
GetDC
ReleaseDC
CreateSolidBrush
SaveDC
DeleteDC
SelectObject
GetStockObject
RestoreDC
SetBkColor
SetMapMode
SetViewportOrgEx
SetTextColor
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
GetClipBox
ScaleWindowExtEx
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
CreateBitmap
DocumentPropertiesA
OpenPrinterA
ClosePrinter
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
SetMask
myTest
testFunc
vcAlpha
vcFade
vcStrech
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CIcos
_adj_fptan
__vbaFreeVar
__vbaLateIdCall
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaStrCat
__vbaHresultCheckObj
_adj_fdiv_m32
ord301
__vbaObjSet
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord305
ord307
__vbaBoolVarNull
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
__vbaObjVar
_adj_fpatan
EVENT_SINK_Release
__vbaNew
ord600
_CIsqrt
ord311
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord313
_adj_fprem
_adj_fdivr_m64
ord716
__vbaFPException
_CIlog
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaLateMemCallLd
_CIatan
__vbaCastObj
_allmul
__vbaLateIdSt
_CItan
_CIexp
__vbaFreeObj
__vbaFreeStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CIcos
_adj_fptan
__vbaFreeVar
__vbaLateIdCall
__vbaEnd
_adj_fdiv_m64
_adj_fprem1
_adj_fdiv_m32
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
__vbaStrCmp
_adj_fpatan
EVENT_SINK_Release
ord600
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
_CIlog
_adj_fdiv_m32i
_adj_fdivr_m32i
_adj_fdivr_m32
_adj_fdiv_r
ord100
ord689
_CIatan
__vbaStrMove
_allmul
__vbaLateIdSt
_CItan
_CIexp
__vbaFreeObj
__vbaFreeStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__vbaVarSub
ord690
_CIcos
_adj_fptan
__vbaStrI4
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
__vbaStrVarMove
__vbaLenBstr
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
__vbaNextEachVar
__vbaFreeObjList
__vbaStrErrVarCopy
_adj_fprem1
__vbaVarSetVarAddref
__vbaResume
__vbaCopyBytes
__vbaStrCat
__vbaBoolErrVar
__vbaSetSystemError
__vbaHresultCheckObj
__vbaLenVar
ord558
_adj_fdiv_m32
__vbaAryDestruct
__vbaForEachCollObj
__vbaExitProc
ord593
ord300
ord301
__vbaOnError
ord595
__vbaObjSet
_adj_fdiv_m16i
ord303
__vbaObjSetAddref
_adj_fdivr_m16i
ord304
ord598
ord305
__vbaFpR4
ord306
__vbaForEachCollVar
ord307
ord309
__vbaRefVarAry
__vbaBoolVarNull
_CIsin
__vbaNextEachCollObj
__vbaVarZero
ord632
__vbaChkstk
EVENT_SINK_AddRef
__vbaGenerateBoundsError
__vbaStrCmp
__vbaVarTstEq
__vbaI2I4
__vbaNextEachCollVar
__vbaObjVar
DllFunctionCall
__vbaCastObjVar
_adj_fpatan
__vbaUI1ErrVar
EVENT_SINK_Release
__vbaVarSetUnk
__vbaNew
__vbaUI1I2
_CIsqrt
ord310
__vbaVarAnd
ord311
EVENT_SINK_QueryInterface
__vbaUI1I4
__vbaExceptHandler
ord312
ord711
ord313
_adj_fprem
_adj_fdivr_m64
ord317
ord716
__vbaFPException
ord318
__vbaInStrVar
__vbaStrVarVal
__vbaUbound
__vbaVarCat
__vbaExitEachVar
_CIlog
__vbaErrorOverflow
__vbaNew2
__vbaInStr
__vbaVarLateMemCallLdRf
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
ord681
__vbaI4Str
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaI4Var
__vbaVarLateMemStAd
__vbaVarCmpEq
__vbaVarAdd
__vbaLateMemCall
__vbaAryLock
__vbaVarDup
__vbaFpI2
__vbaVarCopy
__vbaVarLateMemCallLd
__vbaFpI4
__vbaLateMemCallLd
ord617
_CIatan
__vbaStrMove
__vbaCastObj
__vbaForEachVar
__vbaR8IntI4
_allmul
_CItan
__vbaAryUnlock
_CIexp
__vbaI4ErrVar
__vbaFreeStr
__vbaFreeObj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
WaitForSingleObject
GetLastError
CreateFileA
GetModuleFileNameA
Sleep
WriteFile
SetFilePointer
GetFullPathNameA
CreateProcessA
ReadFile
CreateFileMappingA
lstrcpyA
SetCurrentDirectoryA
GetTempPathA
GetCurrentDirectoryA
SetLastError
ExitProcess
GetModuleHandleA
MapViewOfFile
HeapAlloc
lstrlenA
CreateDirectoryA
HeapFree
GetProcessHeap
GetFileSize
FormatMessageA
LocalFree
DeleteFileA
RemoveDirectoryA
GetTempFileNameA
CreateDialogParamA
IsDlgButtonChecked
GetDlgItemTextA
EndDialog
DialogBoxParamA
DestroyWindow
SendDlgItemMessageA
SetFocus
CheckDlgButton
ShowWindow
wsprintfA
MessageBoxA
GetWindowRect
SetDlgItemTextA
GetDlgItem
MoveWindow
GetSystemMetrics
SetTextColor
TextOutA
CreateFontIndirectA
DeleteObject
CreateSolidBrush
SelectObject
SetTextAlign
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ