ActiveDeskTop
ActiveDeskTopEx
ActiveSameWallPaper
DisableActiveDesktop
ExitAll
GetWallpaper
ViseEntry
Overview
overview
6Static
static
3Actdsp.dll
windows7-x64
5Actdsp.dll
windows10-2004-x64
3KeyGen.exe
windows7-x64
3KeyGen.exe
windows10-2004-x64
3eLock.dll
windows7-x64
6eLock.dll
windows10-2004-x64
6ePaper.chm
windows7-x64
1ePaper.chm
windows10-2004-x64
1ePaper.html
windows7-x64
3ePaper.html
windows10-2004-x64
3ePaper.exe
windows7-x64
6ePaper.exe
windows10-2004-x64
6ePaper.htm
windows7-x64
3ePaper.htm
windows10-2004-x64
3ePaper.url
windows7-x64
6ePaper.url
windows10-2004-x64
3ePlayer.dll
windows7-x64
3ePlayer.dll
windows10-2004-x64
3wpc.dll
windows7-x64
3wpc.dll
windows10-2004-x64
3安装必读.url
windows7-x64
1安装必读.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Actdsp.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Actdsp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
KeyGen.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
KeyGen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
eLock.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
eLock.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ePaper.chm
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
ePaper.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ePaper.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ePaper.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ePaper.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ePaper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ePaper.htm
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
ePaper.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ePaper.url
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ePaper.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
ePlayer.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
ePlayer.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
wpc.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
wpc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
安装必读.url
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
安装必读.url
Resource
win10v2004-20240802-en
Target
de1db90e882ea3dd09686cb315ec61f1_JaffaCakes118
Size
1.3MB
MD5
de1db90e882ea3dd09686cb315ec61f1
SHA1
b9e7f4dbdaead51807d71f793e50b44a798f335e
SHA256
13da8fb83aeb73a28d4a41599a59fbca2d799ec2ecca7c97067413d7583ec03f
SHA512
48854d2fc00eff26c8b36f58ef71039095d5efa8c4b306d2ea8f90da8a7a84677a550bbe3d663ae4c6bbf5e2a7d63dabdfa7ca4b2aecd5e94ea4e452d3241b71
SSDEEP
24576:siu85MgeGgJLMB1bjNlBLEvfp8arnJ1HWBkq9+sAuKtf68orf+rFLcO+8:L5XyJEbplBefGmHQAu+CRr2uP8
Checks for missing Authenticode signature.
resource |
---|
unpack001/Actdsp.dll |
unpack001/KeyGen.exe |
unpack001/eLock.dll |
unpack001/ePaper.exe |
unpack001/ePlayer.ocx |
unpack001/wpc.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetStringTypeA
LCMapStringW
GetStringTypeW
LoadLibraryA
GetProcAddress
Sleep
MultiByteToWideChar
LCMapStringA
WideCharToMultiByte
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
RtlUnwind
MessageBoxA
GetWindowDC
PostMessageA
SendMessageA
FindWindowA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
CoCreateInstance
CoInitialize
CoUninitialize
ActiveDeskTop
ActiveDeskTopEx
ActiveSameWallPaper
DisableActiveDesktop
ExitAll
GetWallpaper
ViseEntry
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFilePointer
DeviceIoControl
CreateFileA
GetVersionExA
LeaveCriticalSection
InterlockedDecrement
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
CloseHandle
EnterCriticalSection
LoadLibraryA
GetProcAddress
InterlockedIncrement
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
InitializeCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
SetStdHandle
RtlUnwind
LCMapStringA
LCMapStringW
FlushFileBuffers
MessageBoxA
GetComputerID
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
ChangeBackColor
ChangeTextColor
ChangeWallpaper
HookTargetWindow
SetAutoHide
SetMainWindow
SetStretchPic
SetTemplateFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ