Description
FreeBuffer
GetParams
Reset
RestoreBuffer
SetParams
Shutdown
Startup
TransformBuffer
Overview
overview
10Static
static
7Invoice.htm
windows7-x64
3Invoice.htm
windows10-2004-x64
3MSRC4Plugin.dll
windows7-x64
5MSRC4Plugin.dll
windows10-2004-x64
5Run.exe
windows7-x64
10Run.exe
windows10-2004-x64
10rssvnc.exe
windows7-x64
3rssvnc.exe
windows10-2004-x64
3vnchooks.dll
windows7-x64
3vnchooks.dll
windows10-2004-x64
3Behavioral task
behavioral1
Sample
Invoice.htm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Invoice.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
MSRC4Plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
MSRC4Plugin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Run.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Run.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
rssvnc.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
rssvnc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
vnchooks.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
vnchooks.dll
Resource
win10v2004-20240802-en
Target
130e123d6f537b42481c916d0e13f046_JaffaCakes118
Size
270KB
MD5
130e123d6f537b42481c916d0e13f046
SHA1
190684ab056ce405524a015e8367984eef1db7b0
SHA256
b247b9bf6d6ffb456265fd7670db0506c7379192df9622022069b0cd96e87704
SHA512
ba2cccb12e13326214b27dc476dad7f3e39973e4367d5b3a1a8599eb77127a0e10c1b7ccb5caaadc40ac11d5f1f05aee330c7954182dd3e1f47975cc856e961f
SSDEEP
6144:Uv1ZbgR0/Vxu1g+a/ko/+ymQVtWphD+iLiZqY+BUoEBEjMcWM:y13u1gFZIQVspzBpBUo/jb
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/MSRC4Plugin.dsm | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/MSRC4Plugin.dsm | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/MSRC4Plugin.dsm |
unpack002/out.upx |
unpack001/Run.exe |
unpack001/rssvnc.exe |
unpack001/vnchooks.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Description
FreeBuffer
GetParams
Reset
RestoreBuffer
SetParams
Shutdown
Startup
TransformBuffer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
EVENT_SINK_GetIDsOfNames
__vbaVarTstGt
__vbaVarSub
__vbaStrI2
_CIcos
_adj_fptan
__vbaStrI4
__vbaVarMove
__vbaVarVargNofree
__vbaAryMove
__vbaFreeVar
ord588
__vbaLineInputStr
__vbaLenBstr
__vbaLateIdCall
__vbaStrVarMove
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
__vbaPut4
EVENT_SINK_Invoke
__vbaRaiseEvent
__vbaFreeObjList
__vbaGetFxStr4
ord516
ord517
__vbaStrErrVarCopy
_adj_fprem1
ord518
__vbaRecAnsiToUni
ord519
__vbaI2Abs
__vbaCopyBytes
__vbaVarCmpNe
__vbaStrCat
__vbaError
__vbaLsetFixstr
__vbaBoolErrVar
ord660
ord661
__vbaSetSystemError
__vbaNameFile
__vbaHresultCheckObj
ord662
__vbaLenVar
ord558
__vbaVargVarCopy
_adj_fdiv_m32
__vbaAryVar
ord666
Zombie_GetTypeInfo
__vbaAryDestruct
ord591
__vbaCyErrVar
ord592
__vbaVarPow
__vbaForEachCollObj
__vbaVarForInit
ord593
__vbaExitProc
ord300
ord594
__vbaOnError
__vbaObjSet
ord595
ord596
_adj_fdiv_m16i
ord303
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
__vbaVarIndexLoad
__vbaFpR4
ord599
ord306
__vbaStrFixstr
__vbaBoolVar
ord520
__vbaFPFix
ord522
ord309
__vbaFpR8
__vbaBoolVarNull
__vbaRefVarAry
_CIsin
__vbaErase
ord631
__vbaNextEachCollObj
__vbaVargVarMove
ord525
ord632
__vbaVarCmpGt
__vbaChkstk
ord526
__vbaFileClose
__vbaCyVar
EVENT_SINK_AddRef
ord527
__vbaGenerateBoundsError
ord528
__vbaStrCmp
ord529
__vbaCyI2
__vbaGet4
__vbaAryConstruct2
__vbaVarTstEq
__vbaDateR8
ord561
__vbaObjVar
__vbaI2I4
DllFunctionCall
ord563
__vbaVarOr
__vbaVarLateMemSt
__vbaFpUI1
__vbaCySub
__vbaCastObjVar
__vbaRedimPreserve
__vbaLbound
_adj_fpatan
__vbaR4Var
ord568
__vbaLateIdCallLd
Zombie_GetTypeInfoCount
__vbaRedim
__vbaStrR8
__vbaRecUniToAnsi
__vbaUI1ErrVar
EVENT_SINK_Release
__vbaNew
ord600
__vbaUI1I2
_CIsqrt
__vbaObjIs
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaUI1I4
__vbaVarMul
__vbaExceptHandler
ord711
ord712
__vbaPrintFile
__vbaStrToUnicode
__vbaR4ErrVar
ord606
_adj_fprem
_adj_fdivr_m64
ord607
__vbaR8ErrVar
__vbaFailedFriend
ord608
ord531
__vbaFPException
ord717
__vbaInStrVar
ord532
ord319
__vbaGetOwner3
__vbaStrVarVal
__vbaUbound
__vbaVarCat
__vbaCheckType
__vbaDateVar
ord535
__vbaLsetFixstrFree
ord536
__vbaI2Var
ord644
ord537
ord645
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaVar2Vec
__vbaInStr
__vbaNew2
__vbaR8Str
ord571
_adj_fdiv_m32i
ord572
_adj_fdivr_m32i
ord573
__vbaStrCopy
__vbaVarSetObj
ord681
__vbaI4Str
__vbaVarNot
__vbaFreeStrList
__vbaDerefAry1
ord576
_adj_fdivr_m32
__vbaPowerR8
_adj_fdiv_r
ord578
ord685
ord100
__vbaVarTstNe
ord579
__vbaI4Var
__vbaVarCmpEq
ord610
__vbaFpCy
__vbaAryLock
__vbaVarAdd
__vbaLateMemCall
ord320
__vbaVarDup
__vbaStrToAnsi
ord321
ord613
__vbaFpI2
__vbaFpI4
__vbaVarCopy
__vbaVarLateMemCallLd
ord616
__vbaLateMemCallLd
ord617
__vbaVarSetObjAddref
_CIatan
__vbaAryCopy
__vbaI2ErrVar
ord618
__vbaCastObj
__vbaStrMove
__vbaStrVarCopy
__vbaR8IntI4
ord619
__vbaI4Cy
_allmul
__vbaLateIdSt
_CItan
ord546
__vbaUI1Var
__vbaFPInt
__vbaAryUnlock
__vbaVarForNext
_CIexp
__vbaMidStmtBstr
__vbaI4ErrVar
__vbaFreeObj
__vbaFreeStr
ord581
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
gethostbyname
accept
gethostname
WSAGetLastError
recv
send
getsockname
getpeername
inet_addr
listen
ioctlsocket
connect
htons
htonl
bind
shutdown
closesocket
socket
setsockopt
WSACleanup
WSAStartup
timeGetTime
CloseHandle
CreateFileA
DeviceIoControl
Sleep
Beep
GetCurrentThreadId
GetSystemDirectoryA
GetSystemTime
FlushFileBuffers
CreateDirectoryA
MoveFileA
SetErrorMode
GetDriveTypeA
GetLogicalDriveStringsA
FileTimeToSystemTime
GetFileTime
SetFilePointer
ReadFile
WriteFile
SetFileTime
SystemTimeToFileTime
SetEndOfFile
GetVersionExA
WaitForSingleObject
SetThreadPriority
GetCurrentThread
OpenEventA
GlobalUnlock
GlobalLock
GlobalAlloc
SetProcessShutdownParameters
TerminateProcess
CreateProcessA
ReleaseMutex
CreateMutexA
GetStdHandle
AllocConsole
MoveFileExA
FormatMessageA
SetLastError
WriteConsoleA
OutputDebugStringA
GetCurrentProcessId
OpenProcess
SearchPathA
GlobalFree
TlsGetValue
TlsFree
TlsAlloc
DuplicateHandle
GetLastError
TlsSetValue
CreateSemaphoreA
ReleaseSemaphore
DeleteCriticalSection
InitializeCriticalSection
GetProcAddress
LoadLibraryA
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
DeleteFileA
FreeLibrary
CopyFileA
LeaveCriticalSection
EnterCriticalSection
GetSystemInfo
GetVersion
GetModuleHandleA
lstrlenA
GetCurrentProcess
GetStartupInfoA
GetProfileStringA
GetComputerNameA
ResumeThread
CreateThread
IsBadWritePtr
IsBadReadPtr
GetProcessWindowStation
GetUserObjectInformationA
ExitWindowsEx
EnableWindow
GetSubMenu
SetMenuDefaultItem
TrackPopupMenu
EnableMenuItem
DestroyMenu
LoadMenuA
ToAscii
VkKeyScanA
GetAsyncKeyState
MapVirtualKeyA
PeekMessageA
GetMenuItemID
WaitMessage
IsIconic
WaitForInputIdle
GetParent
GetClipboardOwner
GetClipboardData
GetForegroundWindow
IsWindowVisible
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetIconInfo
DrawIconEx
SetClipboardViewer
IsWindow
EnumWindows
GetWindowTextA
OpenDesktopA
FindWindowA
GetClassNameA
ChangeClipboardChain
DestroyWindow
GetDesktopWindow
WindowFromPoint
GetWindowRect
RegisterWindowMessageA
mouse_event
InvalidateRect
wsprintfA
GetKeyboardState
keybd_event
GetThreadDesktop
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetCursorPos
SetCursorPos
GetDC
ReleaseDC
EnumDisplaySettingsA
GetDlgItemTextA
SetFocus
EndDialog
SetWindowTextA
LoadStringA
DialogBoxParamA
GetScrollInfo
PostMessageA
SetDlgItemTextA
GetDlgItem
SendDlgItemMessageA
SetForegroundWindow
MessageBoxA
SystemParametersInfoA
SendMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
KillTimer
PostQuitMessage
SetTimer
LoadIconA
LoadCursorA
RegisterClassExA
AdjustWindowRect
CreateWindowExA
GetWindowLongA
SetWindowLongA
ShowWindow
GetSystemMetrics
SetWindowPos
IsRectEmpty
LoadImageA
EnumDesktopWindows
BitBlt
CreatePalette
GetBitmapBits
GetObjectA
RealizePalette
CreateDIBSection
SelectPalette
SetDIBColorTable
GetDeviceCaps
CreateCompatibleBitmap
GetPixel
ExtEscape
GetSystemPaletteEntries
SetBkMode
GetStockObject
GetClipBox
CreateCompatibleDC
CreateSolidBrush
SelectObject
PatBlt
DeleteDC
GetDIBits
CreateDCA
GdiFlush
StretchBlt
DeleteObject
Shell_NotifyIconA
SHAppBarMessage
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
InitCommonControlsEx
CoInitialize
CoCreateInstance
OpenProcessToken
RegCreateKeyExA
RevertToSelf
DuplicateToken
ImpersonateLoggedOnUser
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegCreateKeyA
RegSetValueExA
GetUserNameA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
_ismbcdigit
atoi
_mbsicmp
memcpy
strcpy
strrchr
strlen
strcat
??3@YAXPAX@Z
__CxxFrameHandler
sprintf
memset
strstr
strcmp
malloc
free
printf
strncpy
memmove
sscanf
__dllonexit
strncat
strchr
tolower
??2@YAPAXI@Z
abs
calloc
fflush
_fdopen
_dup2
_open_osfhandle
_onexit
_exit
_XcptFilter
fclose
_iob
_acmdln
__getmainargs
_initterm
__setusermatherr
_vsnprintf
ctime
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
??1type_info@@UAE@XZ
_controlfp
_purecall
strncmp
_snprintf
time
fgets
fopen
exit
setbuf
_beginthreadex
_endthreadex
fprintf
realloc
memcmp
_strdup
_strnicmp
_CxxThrowException
_stricmp
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetClientRect
PostMessageA
FindWindowA
GetWindowRect
PostThreadMessageA
GetUpdateRgn
ClientToScreen
IsWindowVisible
GetCursor
GetPropA
SetPropA
CallNextHookEx
EnumWindows
RemovePropA
SetWindowsHookExA
UnhookWindowsHookEx
RegisterWindowMessageA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
GetRegionData
DeleteObject
CreateRectRgn
GetStringTypeW
GetStringTypeA
LCMapStringA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
LCMapStringW
LeaveCriticalSection
Sleep
GetModuleFileNameA
GetModuleHandleA
GlobalAddAtomA
HeapFree
HeapAlloc
GetCommandLineA
GetVersion
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
ExitProcess
RtlUnwind
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
HooksType
SetHooks
SetKeyboardFilterHook
SetMouseFilterHook
UnSetHooks
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ