@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
Overview
overview
7Static
static
7csDSzbq/007.dll
windows7-x64
5csDSzbq/007.dll
windows10-2004-x64
5csDSzbq/CS_007.exe
windows7-x64
3csDSzbq/CS_007.exe
windows10-2004-x64
7csDSzbq/�...gr.htm
windows7-x64
3csDSzbq/�...gr.htm
windows10-2004-x64
3csDSzbq/�...cn.url
windows7-x64
1csDSzbq/�...cn.url
windows10-2004-x64
1Behavioral task
behavioral1
Sample
csDSzbq/007.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
csDSzbq/007.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
csDSzbq/CS_007.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
csDSzbq/CS_007.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
csDSzbq/必看说明cngr.htm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
csDSzbq/必看说明cngr.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
csDSzbq/河源下载站-cngr.cn.url
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
csDSzbq/河源下载站-cngr.cn.url
Resource
win10v2004-20240802-en
Target
040fd4ab8447f8fef479a79edb9961ea_JaffaCakes118
Size
435KB
MD5
040fd4ab8447f8fef479a79edb9961ea
SHA1
90b6cf2a3f0ddd45be51bb3c39a2516c8b4a8afe
SHA256
aa8cbb04c607ea63408f3f17283cac3a8bf77d10dd09dfa581f941e941678b61
SHA512
02ea5702d07523ad1e2a5351b9985da7601537a3c4d253c51bec18f789ac0f70d2b4dcf12af52f81b0ea76b7aa1d81693974404f6d678c04fceefb50f4f84053
SSDEEP
12288:Z4xK5YN863jFzQYU9cIoM/gkd6E4zZgDnMZ2FI:aM5xSlIjtdV8
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/csDSzbq/007.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/csDSzbq/007.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/csDSzbq/007.dll |
unpack001/csDSzbq/CS_007.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
SetFileSecurityA
SetFileSecurityW
CloseHandle
CompareStringA
CreateDirectoryA
CreateDirectoryW
CreateFileA
CreateFileW
DeleteFileA
DeleteFileW
DosDateTimeToFileTime
ExitProcess
ExpandEnvironmentStringsA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceA
FreeLibrary
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetDateFormatA
GetFileAttributesA
GetFileAttributesW
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetNumberFormatA
GetProcAddress
GetProcessHeap
GetStdHandle
GetTempPathA
GetTickCount
GetTimeFormatA
GetVersionExA
GlobalAlloc
HeapAlloc
HeapFree
HeapReAlloc
IsDBCSLeadByte
LoadLibraryA
LocalFileTimeToFileTime
MoveFileA
MoveFileExA
MultiByteToWideChar
ReadFile
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetFileTime
SetLastError
Sleep
SystemTimeToFileTime
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpiA
lstrlenA
ord17
CommDlgExtendedError
GetOpenFileNameA
GetSaveFileNameA
DeleteObject
SHBrowseForFolderA
SHChangeNotify
SHFileOperationA
SHGetFileInfoA
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteExA
SHGetPathFromIDListA
CharToOemA
CharToOemBuffA
CharUpperA
CopyRect
CreateWindowExA
DefWindowProcA
DestroyIcon
DestroyWindow
DialogBoxParamA
DispatchMessageA
EnableWindow
EndDialog
FindWindowExA
GetClassNameA
GetClientRect
GetDlgItem
GetDlgItemTextA
GetMessageA
GetParent
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongA
GetWindowRect
GetWindowTextA
IsWindow
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadIconA
LoadStringA
MapWindowPoints
MessageBoxA
OemToCharA
OemToCharBuffA
PeekMessageA
PostMessageA
RegisterClassExA
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetFocus
SetMenu
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UpdateWindow
WaitForInputIdle
wsprintfA
wvsprintfA
CLSIDFromString
CoCreateInstance
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ