_DllMain@12
load
Overview
overview
7Static
static
71/loader_0...01.dll
windows7-x64
31/loader_0...01.dll
windows10-2004-x64
31/loader_0...01.sys
windows7-x64
11/loader_0...01.sys
windows10-2004-x64
12/counter.exe
windows7-x64
32/counter.exe
windows10-2004-x64
73/psih.exe
windows7-x64
73/psih.exe
windows10-2004-x64
73/unpacked_.exe
windows7-x64
33/unpacked_.exe
windows10-2004-x64
34/decrypted.exe
windows7-x64
64/decrypted.exe
windows10-2004-x64
64/hui.exe
windows7-x64
74/hui.exe
windows10-2004-x64
7Behavioral task
behavioral1
Sample
1/loader_00400000.Embedded01.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1/loader_00400000.Embedded01.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
1/loader_00400000.Embedded01.sys
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
1/loader_00400000.Embedded01.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
2/counter.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
2/counter.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
3/psih.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
3/psih.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
3/unpacked_.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3/unpacked_.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
4/decrypted.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
4/decrypted.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
4/hui.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
4/hui.exe
Resource
win10v2004-20240802-en
Target
db2cc70364a13c3e10789a53043371f3_JaffaCakes118
Size
169KB
MD5
db2cc70364a13c3e10789a53043371f3
SHA1
7d5c1ecbe541f916c3b1f657ed300c08a0977d93
SHA256
64c68894407ec425ba179815d44b567b02a72056d8e79d9223062e0a60ea3b3a
SHA512
fd2f379e711164ae70d463417d7c72ddc850ec73221d045d68db06620bedf74d633d8f238507a77915514271231d870450147bf22b2f5061c68a9c354bca1070
SSDEEP
3072:3wfYejIjqK2aqW/MH+IW5wy+4dlQq+OQ3sr4A8nsVw02MBYXDcP1E:3wgZjqK2rMMFfy+UlH9QcBw02YYXDUS
resource | yara_rule |
---|---|
static1/unpack001/3/psih.safe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/1/loader_00400000.Embedded01.DLL |
unpack001/1/loader_00400000.Embedded01.SYS |
unpack001/2/counter.exe |
unpack001/3/psih.safe |
unpack002/out.upx |
unpack001/3/unpacked_.safe |
unpack001/4/decrypted.ex_ |
unpack001/4/hui.ex1 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_except_handler3
memcmp
_adjust_fdiv
malloc
_initterm
free
fgets
fopen
fwrite
fclose
memset
srand
strcmp
memcpy
sprintf
rand
atoi
strcpy
strncmp
strcat
strncpy
strlen
WSAStartup
gethostname
send
inet_ntoa
setsockopt
connect
shutdown
inet_addr
gethostbyname
socket
select
recv
closesocket
ntohs
htons
sendto
ioctlsocket
TranslateMessage
DispatchMessageA
wsprintfA
GetMessageA
SystemTimeToFileTime
GlobalFree
GlobalAlloc
VirtualFree
VirtualAlloc
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetTimeFormatA
Sleep
HeapAlloc
GetProcessHeap
HeapFree
GetTickCount
DeleteFileA
GetDateFormatA
GetTimeZoneInformation
GetLocalTime
GetFileAttributesA
lstrcpynA
lstrcatA
lstrcpyA
ExpandEnvironmentStringsA
CreateThread
ExitThread
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
_DllMain@12
load
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExFreePoolWithTag
RtlAppendUnicodeToString
memcpy
memset
ExAllocatePoolWithTag
_except_handler3
ObQueryNameString
ObfDereferenceObject
ObReferenceObjectByHandle
ProbeForRead
ExGetPreviousMode
toupper
KeReleaseMutex
KeWaitForSingleObject
RtlFreeUnicodeString
RtlCopyUnicodeString
MmIsAddressValid
RtlInitUnicodeString
ZwEnumerateKey
KeServiceDescriptorTable
NtBuildNumber
RtlAppendUnicodeStringToString
ObReferenceObjectByName
IoDriverObjectType
ZwClose
ZwSetInformationProcess
ZwDuplicateToken
ZwOpenProcessToken
ZwOpenProcess
IofCompleteRequest
KeInitializeMutex
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
GetProcAddress
LoadLibraryA
ReadFile
ExitThread
VirtualAlloc
VirtualFree
WaitForSingleObject
CreateThread
Sleep
CloseHandle
RegEnumValueA
RegCloseKey
RegOpenKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TranslateMessage
ShowWindow
SetTimer
GetMessageA
RegisterClassExA
PostQuitMessage
LoadImageA
LoadIconA
LoadCursorA
KillTimer
GetClientRect
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
UpdateWindow
BeginPaint
GetCommandLineA
VirtualFree
VirtualAlloc
Sleep
LoadLibraryA
GetProcAddress
GetModuleHandleA
ExitProcess
GetObjectA
DeleteDC
CreateCompatibleDC
BitBlt
SelectObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ