ExitThread
SetThread
Overview
overview
4Static
static
3Ts-闪速�...lp.doc
windows7-x64
4Ts-闪速�...lp.doc
windows10-2004-x64
1Ts-闪速�...ng.dll
windows7-x64
3Ts-闪速�...ng.dll
windows10-2004-x64
3Ts-闪速�...un.dll
windows7-x64
3Ts-闪速�...un.dll
windows10-2004-x64
3Ts-闪速�...KM.exe
windows7-x64
3Ts-闪速�...KM.exe
windows10-2004-x64
3Ts-闪速�...rt.exe
windows7-x64
3Ts-闪速�...rt.exe
windows10-2004-x64
3Ts-闪速�...te.exe
windows7-x64
3Ts-闪速�...te.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
Ts-闪速启动/Help.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ts-闪速启动/Help.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Ts-闪速启动/Monitoring.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Ts-闪速启动/Monitoring.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
Ts-闪速启动/RightFun.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Ts-闪速启动/RightFun.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Ts-闪速启动/RightKM.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Ts-闪速启动/RightKM.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Ts-闪速启动/Ts-Fs_Start.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Ts-闪速启动/Ts-Fs_Start.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Ts-闪速启动/Update.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Ts-闪速启动/Update.exe
Resource
win10v2004-20240802-en
Target
d99efe82e1eeaac6573af9d6ffff9657_JaffaCakes118
Size
5.0MB
MD5
d99efe82e1eeaac6573af9d6ffff9657
SHA1
bf791c3516fdb79bb5e0b523974216e069004037
SHA256
137a6f3b8416bfbd8b752e5f927d01eff0cc197ac31b6f941b4a4d87d0bc00d7
SHA512
0dcfb9c2815cdeed441227223fafdc0d970500a64e4bd1263db5cc592bb1e30b9cbca4f69d960333326f3049ea70a277137f6b4d8e5aa192dd602b8de6a5471a
SSDEEP
98304:RbPaZZKNVaRrcduNcjwiO2TVDilDVSUHXXTjW2zcHscP8nUGnYv1Hbxsth3:xA8Nk9pcM26rnTjWlbHftHbxsth3
Checks for missing Authenticode signature.
resource |
---|
unpack001/Ts-闪速启动/Monitoring.dll |
unpack001/Ts-闪速启动/RightFun.dll |
unpack001/Ts-闪速启动/RightKM.exe |
unpack001/Ts-闪速启动/Ts-Fs_Start.exe |
unpack001/Ts-闪速启动/Update.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord540
ord1570
ord1253
ord1255
ord6467
ord1578
ord600
ord826
ord269
ord1243
ord342
ord5572
ord5683
ord4129
ord858
ord924
ord537
ord2915
ord800
ord1116
ord1176
ord1575
ord1182
ord1168
ord1577
ord1197
__CxxFrameHandler
??1type_info@@UAE@XZ
??3@YAXPAX@Z
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
??2@YAPAXI@Z
LocalAlloc
ExitThread
LocalFree
GetModuleFileNameA
GetPrivateProfileStringA
CreateThread
CreateFileA
WideCharToMultiByte
ReadDirectoryChangesW
FindWindowA
SetWindowTextA
ShowWindow
SetForegroundWindow
SetActiveWindow
SendMessageA
PathFileExistsA
ExitThread
SetThread
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegFlushKey
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
LoadStringW
MessageBoxA
CharNextW
ShowWindow
SetWindowTextW
SetForegroundWindow
SetActiveWindow
SendMessageW
MessageBoxW
LoadStringW
GetSystemMetrics
FindWindowW
CharUpperBuffW
CharNextW
lstrcmpiA
LoadLibraryA
LocalFree
LocalAlloc
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
IsValidLocale
GetSystemDefaultUILanguage
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetUserDefaultUILanguage
GetLocaleInfoW
GetLastError
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
CompareStringW
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
WritePrivateProfileStringW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQueryEx
VirtualQuery
VirtualFree
SignalObjectAndWait
SetLastError
SetFilePointer
SetEvent
SetEndOfFile
ResetEvent
ReadFile
MultiByteToWideChar
LockResource
LoadResource
LeaveCriticalSection
InitializeCriticalSection
GetVolumeInformationW
GetVersionExW
GetThreadLocale
GetStdHandle
GetProcAddress
GetPrivateProfileStringW
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileAttributesW
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentProcess
GetCPInfo
InterlockedExchange
InterlockedCompareExchange
FreeLibrary
FormatMessageW
FindResourceW
FindFirstFileW
FindClose
EnumCalendarInfoW
EnterCriticalSection
DeleteCriticalSection
CreateFileW
CreateEventW
CompareStringW
CloseHandle
Sleep
DeleteMenuKey
MenuExists
MenuGetAddToLnk
RemoveRMN
SetFileMenu
SetFolderMenu
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
LoadStringW
MessageBoxA
CharNextW
MessageBoxW
LoadStringW
GetSystemMetrics
CharUpperBuffW
CharNextW
lstrcmpiA
LoadLibraryA
LocalFree
LocalAlloc
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
IsValidLocale
GetSystemDefaultUILanguage
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetUserDefaultUILanguage
GetLocaleInfoW
GetLastError
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
CompareStringW
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleW
WritePrivateProfileStringW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQueryEx
VirtualQuery
VirtualFree
SignalObjectAndWait
SetLastError
SetFilePointer
SetEvent
SetEndOfFile
ResetEvent
ReadFile
MultiByteToWideChar
LockResource
LoadResource
LeaveCriticalSection
InitializeCriticalSection
GetVersionExW
GetThreadLocale
GetStdHandle
GetProcAddress
GetPrivateProfileStringW
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileAttributesW
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentProcess
GetCPInfo
InterlockedExchange
InterlockedCompareExchange
FreeLibrary
FormatMessageW
FindResourceW
FindFirstFileW
FindClose
EnumCalendarInfoW
EnterCriticalSection
DeleteCriticalSection
CreateFileW
CreateEventW
CompareStringW
CloseHandle
Sleep
MenuGetAddToLnk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
SysFreeString
RegQueryValueExW
LoadStringW
AlphaBlend
UnrealizeObject
VerQueryValueW
WNetOpenEnumW
OleLoadPicture
CreateStreamOnHGlobal
UninitializeFlatSB
SHGetFileInfoW
GetSaveFileNameW
OpenPrinterW
waveOutWrite
GdipGetImageGraphicsContext
LresultFromObject
SetThread
DeleteMenuKey
acmFormatSuggest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
SysFreeString
RegQueryValueExW
LoadStringW
AlphaBlend
UnrealizeObject
VerQueryValueW
WNetGetConnectionW
CreateStreamOnHGlobal
InitializeFlatSB
ShellExecuteW
GetOpenFileNameW
GdipGetImagePixelFormat
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE