DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Overview
overview
5Static
static
3砺青虚�...ex.vbs
windows7-x64
1砺青虚�...ex.vbs
windows10-2004-x64
1砺青虚�...et.dll
windows7-x64
3砺青虚�...et.dll
windows10-2004-x64
3砺青虚�...d5.dll
windows7-x64
3砺青虚�...d5.dll
windows10-2004-x64
3砺青虚�...hm.dll
windows7-x64
3砺青虚�...hm.dll
windows10-2004-x64
3砺青虚�...��.bat
windows7-x64
5砺青虚�...��.bat
windows10-2004-x64
5砺青虚�...ex.vbs
windows7-x64
1砺青虚�...ex.vbs
windows10-2004-x64
1砺青虚�...reg.js
windows7-x64
3砺青虚�...reg.js
windows10-2004-x64
3砺青虚�...fg.vbs
windows7-x64
1砺青虚�...fg.vbs
windows10-2004-x64
1砺青虚�...ig.vbs
windows7-x64
1砺青虚�...ig.vbs
windows10-2004-x64
1砺青虚�...st.vbs
windows7-x64
1砺青虚�...st.vbs
windows10-2004-x64
1砺青虚�...st.vbs
windows7-x64
1砺青虚�...st.vbs
windows10-2004-x64
1砺青虚�...og.vbs
windows7-x64
1砺青虚�...og.vbs
windows10-2004-x64
1砺青虚�...st.vbs
windows7-x64
1砺青虚�...st.vbs
windows10-2004-x64
1砺青虚�...st.vbs
windows7-x64
1砺青虚�...st.vbs
windows10-2004-x64
1砺青虚�...ak.vbs
windows7-x64
1砺青虚�...ak.vbs
windows10-2004-x64
1砺青虚�...k2.vbs
windows7-x64
1砺青虚�...k2.vbs
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
砺青虚拟主机管理系统 v4.80/LQHM/URL/index.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
砺青虚拟主机管理系统 v4.80/LQHM/URL/index.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
砺青虚拟主机管理系统 v4.80/LQHM/dll/AspSocket.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
砺青虚拟主机管理系统 v4.80/LQHM/dll/AspSocket.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
砺青虚拟主机管理系统 v4.80/LQHM/dll/CnMd5.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
砺青虚拟主机管理系统 v4.80/LQHM/dll/CnMd5.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
砺青虚拟主机管理系统 v4.80/LQHM/dll/lqhm.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
砺青虚拟主机管理系统 v4.80/LQHM/dll/lqhm.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
砺青虚拟主机管理系统 v4.80/LQHM/dll/注册组件.bat
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
砺青虚拟主机管理系统 v4.80/LQHM/dll/注册组件.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
砺青虚拟主机管理系统 v4.80/LQHM/index.vbs
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
砺青虚拟主机管理系统 v4.80/LQHM/index.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
砺青虚拟主机管理系统 v4.80/LQHM/newuserreg.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
砺青虚拟主机管理系统 v4.80/LQHM/newuserreg.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/MailCfg.vbs
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/MailCfg.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/config.vbs
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/config.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/menuClass_list.vbs
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/menuClass_list.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/menu_list.vbs
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/menu_list.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/opLog.vbs
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/opLog.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/productClass_list.vbs
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/productClass_list.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/product_list.vbs
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/product_list.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/product_list_bak.vbs
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/product_list_bak.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/product_list_bak2.vbs
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
砺青虚拟主机管理系统 v4.80/LQHM/user/Admin/product_list_bak2.vbs
Resource
win10v2004-20240802-en
Target
b7d89ade9c8bdd254153a9cf6f73a24f_JaffaCakes118
Size
1.2MB
MD5
b7d89ade9c8bdd254153a9cf6f73a24f
SHA1
6c509df6dba3c3725124bd95280531b18a54a8f6
SHA256
f8d05ff74a6bce735d23a8cef06144c44f944ed5cead08a2771cd456c9cfc524
SHA512
13c9c95e76878560579c425b0ae6a87d729ce9e72b609236aac7eded3a59a3cdbbf72a73af9368750eb4138362969c6aaaa753f7ec78793f1c65e6fed0acde04
SSDEEP
24576:B8buZTvCz2oUEZb6Dl0E+8Yasd4xdQmcYR7y9Rwb5:s0Cz23Eh6Jh3YasVYRfb5
Checks for missing Authenticode signature.
resource |
---|
unpack001/砺青虚拟主机管理系统 v4.80/LQHM/dll/AspSocket.dll |
unpack001/砺青虚拟主机管理系统 v4.80/LQHM/dll/CnMd5.dll |
unpack001/砺青虚拟主机管理系统 v4.80/LQHM/dll/lqhm.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
lstrlenW
HeapAlloc
HeapCreate
MultiByteToWideChar
InterlockedDecrement
DebugBreak
GetVersionExW
HeapFree
GetSystemInfo
lstrlenA
EnterCriticalSection
InterlockedIncrement
DisableThreadLibraryCalls
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FormatMessageW
LocalFree
SysStringLen
LoadRegTypeLi
SysFreeString
SysAllocString
ord32
ord57
ord18
ord15
ord21
ord23
ord58
ord30
ord16
ord25
gethostbyname
WSAStartup
WSAGetLastError
socket
connect
htons
WSACleanup
inet_addr
recv
send
closesocket
setsockopt
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
__vbaVarSub
_CIcos
_adj_fptan
__vbaVarMove
__vbaVarVargNofree
ord693
__vbaFreeVar
__vbaLenBstr
__vbaStrVarMove
ord695
__vbaFreeVarList
__vbaVarIdiv
_adj_fdiv_m64
_adj_fprem1
ord518
ord629
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaVarXor
__vbaAryDestruct
__vbaVarIndexLoadRefLock
__vbaVarForInit
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
__vbaBoolVarNull
__vbaRefVarAry
_CIsin
__vbaVarCmpGt
__vbaVargVarMove
ord632
__vbaChkstk
EVENT_SINK_AddRef
__vbaGenerateBoundsError
__vbaVarTstEq
__vbaI2I4
__vbaVarOr
_adj_fpatan
__vbaRedim
EVENT_SINK_Release
_CIsqrt
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaVarMul
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
ord717
__vbaStrVarVal
__vbaUbound
__vbaVarCat
_CIlog
__vbaErrorOverflow
_adj_fdiv_m32i
_adj_fdivr_m32i
ord573
__vbaStrCopy
__vbaVarCmpLt
__vbaVarNot
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord101
ord102
__vbaI4Var
ord103
ord104
ord105
__vbaVarAdd
__vbaVarMod
__vbaVarCopy
__vbaVarTstGe
_CIatan
__vbaStrMove
ord619
_allmul
__vbaLenVarB
_CItan
__vbaAryUnlock
__vbaUI1Var
__vbaVarForNext
_CIexp
__vbaFreeObj
__vbaFreeStr
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EVENT_SINK_GetIDsOfNames
__vbaVarSub
__vbaVarTstGt
__vbaStrI2
_CIcos
_adj_fptan
__vbaVarMove
__vbaVarVargNofree
ord693
__vbaAryMove
__vbaFreeVar
__vbaLenBstr
__vbaStrVarMove
__vbaFreeVarList
__vbaVarIdiv
_adj_fdiv_m64
EVENT_SINK_Invoke
__vbaVarIndexStore
__vbaFreeObjList
ord516
_adj_fprem1
ord518
ord519
__vbaI2Abs
__vbaVarCmpNe
__vbaStrCat
ord629
__vbaLsetFixstr
__vbaSetSystemError
ord662
__vbaHresultCheckObj
__vbaLenVar
__vbaVargVarCopy
_adj_fdiv_m32
Zombie_GetTypeInfo
__vbaVarXor
__vbaAryDestruct
__vbaVarIndexLoadRefLock
__vbaVarForInit
ord300
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
ord303
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
__vbaVarIndexLoad
ord306
ord309
__vbaBoolVarNull
__vbaVargVar
__vbaRefVarAry
__vbaVarTstLt
_CIsin
ord631
__vbaErase
__vbaVarCmpGt
__vbaVargVarMove
ord632
__vbaChkstk
EVENT_SINK_AddRef
ord528
__vbaGenerateBoundsError
__vbaStrCmp
__vbaVarTstEq
__vbaObjVar
DllFunctionCall
__vbaVarOr
_adj_fpatan
__vbaFixstrConstruct
Zombie_GetTypeInfoCount
__vbaRedim
EVENT_SINK_Release
__vbaNew
_CIsqrt
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaStrUI1
__vbaVarMul
__vbaExceptHandler
ord711
__vbaStrToUnicode
ord712
_adj_fprem
_adj_fdivr_m64
ord607
ord608
__vbaFPException
__vbaInStrVar
ord319
__vbaStrVarVal
__vbaUbound
__vbaVarCat
__vbaDateVar
__vbaLsetFixstrFree
_CIlog
__vbaErrorOverflow
__vbaInStr
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaVarSetObj
__vbaStrCopy
ord573
__vbaVarNot
__vbaFreeStrList
__vbaVarCmpLt
_adj_fdivr_m32
_adj_fdiv_r
ord685
__vbaVarTstNe
ord101
ord102
__vbaI4Var
ord103
__vbaVarCmpEq
ord104
ord610
ord105
__vbaAryLock
__vbaLateMemCall
__vbaVarAdd
ord320
__vbaStrToAnsi
__vbaVarDup
__vbaFreeVarg
ord321
ord613
__vbaVarMod
__vbaVarTstGe
__vbaFpI4
__vbaVarLateMemCallLd
__vbaVarCopy
ord617
__vbaVarSetObjAddref
_CIatan
__vbaAryCopy
__vbaCastObj
__vbaStrMove
__vbaI2ErrVar
__vbaStrVarCopy
ord619
__vbaR8IntI4
_allmul
__vbaLenVarB
_CItan
ord546
__vbaFPInt
__vbaAryUnlock
__vbaVarForNext
_CIexp
__vbaFreeStr
__vbaFreeObj
__vbaI4ErrVar
ord581
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ