@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Overview
overview
3Static
static
3wwwhack-1....110.js
windows7-x64
3wwwhack-1....110.js
windows10-2004-x64
3wwwhack-1....2.html
windows7-x64
3wwwhack-1....2.html
windows10-2004-x64
3wwwhack-1....ch.exe
windows7-x64
3wwwhack-1....ch.exe
windows10-2004-x64
3wwwhack-1....32.dll
windows7-x64
3wwwhack-1....32.dll
windows10-2004-x64
3wwwhack-1....ck.exe
windows7-x64
3wwwhack-1....ck.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
wwwhack-1.946/cache/2110.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
wwwhack-1.946/cache/2110.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
wwwhack-1.946/cache/2122.html
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
wwwhack-1.946/cache/2122.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
wwwhack-1.946/patch.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
wwwhack-1.946/patch.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
wwwhack-1.946/unzip32.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
wwwhack-1.946/unzip32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
wwwhack-1.946/wwwhack.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
wwwhack-1.946/wwwhack.exe
Resource
win10v2004-20240802-en
Target
b5ead3cee986bbdf1e11006b79ae0170_JaffaCakes118
Size
437KB
MD5
b5ead3cee986bbdf1e11006b79ae0170
SHA1
bbe6e27ba6dcf941660fd2b2d6bd0cdf7f163333
SHA256
0f59d6926140cbe7ce01a9156fd02d61a3553e6eab0c69d454291a039c56367c
SHA512
79bbf8e7acd018992069690713b4dc4f63cb82b1090cfab888bd6d05ed9486277408e09415fa6ee5aa12468b1d6835ffe68e5d8316846d23cd4a2b0d7ce2723a
SSDEEP
6144:zvG4Q/OD4Yx+tgHc4yGKDjED0i41LxqCftCodUw5CRVM0rGTWdiIpwo:zvFQmD44+GtdKDAoRXFCodwjrBjr
Checks for missing Authenticode signature.
resource |
---|
unpack001/wwwhack-1.946/patch.exe |
unpack001/wwwhack-1.946/unzip32.dll |
unpack001/wwwhack-1.946/wwwhack.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InterlockedExchange
HeapAlloc
GetLastError
CreateFileA
GetCurrentProcess
GetVersion
SetFileTime
SetFileAttributesA
FileTimeToLocalFileTime
GetFullPathNameA
CloseHandle
CreateMutexA
FindClose
SetVolumeLabelA
GetFileAttributesA
GetFileTime
FileTimeToDosDateTime
lstrcpyA
GlobalLock
GlobalAlloc
GlobalFree
GlobalUnlock
InitializeCriticalSection
WaitForSingleObject
ReleaseMutex
GetVolumeInformationA
lstrlenA
lstrcmpiA
EnterCriticalSection
GetDriveTypeA
lstrcpynA
LeaveCriticalSection
GetProcessHeap
HeapFree
FindFirstFileA
FindNextFileA
HeapDestroy
TlsFree
SetLastError
GetCurrentDirectoryA
HeapReAlloc
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetTimeZoneInformation
HeapCreate
VirtualFree
DeleteCriticalSection
ExitProcess
VirtualAlloc
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
TerminateProcess
FlushFileBuffers
WriteFile
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetCurrentThreadId
TlsSetValue
TlsAlloc
FileTimeToSystemTime
TlsGetValue
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetFilePointer
ReadFile
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
DeleteFileA
CreateDirectoryA
CharToOemA
OemToCharA
GetSecurityDescriptorControl
GetKernelObjectSecurity
AdjustTokenPrivileges
IsValidSecurityDescriptor
GetSecurityDescriptorDacl
SetKernelObjectSecurity
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
IsValidAcl
GetSecurityDescriptorGroup
GetSecurityDescriptorLength
IsValidSid
OpenProcessToken
LookupPrivilegeValueA
UzpFreeMemBuffer
UzpVersion
UzpVersion2
Wiz_Grep
Wiz_Init
Wiz_NoPrinting
Wiz_SetOpts
Wiz_SingleEntryUnzip
Wiz_Unzip
Wiz_UnzipToMemory
Wiz_Validate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
@THackApp@CallBack$qqsususp7HCONV__p5HSZ__t4p10HDDEDATA__ulul
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ