GetFrameBasedStackTrace
GetRawStackTrace
LogStackTrace
Overview
overview
6Static
static
3FastMM_Ful...de.dll
windows7-x64
3FastMM_Ful...de.dll
windows10-2004-x64
3redappleTurnIp.exe
windows7-x64
6redappleTurnIp.exe
windows10-2004-x64
6乐趣下载.url
windows7-x64
1乐趣下载.url
windows10-2004-x64
1代理IP�...��.exe
windows7-x64
3代理IP�...��.exe
windows10-2004-x64
3使用说明.url
windows7-x64
1使用说明.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
FastMM_FullDebugMode.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FastMM_FullDebugMode.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
redappleTurnIp.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
redappleTurnIp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
乐趣下载.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
乐趣下载.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
代理IP自动搜索更改器1.0注册机.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
代理IP自动搜索更改器1.0注册机.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
使用说明.url
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
使用说明.url
Resource
win10v2004-20240802-en
Target
1397e9b3109627a511866e12ab464d41_JaffaCakes118
Size
818KB
MD5
1397e9b3109627a511866e12ab464d41
SHA1
002b3f05a6aec67230f4b955652bce112bf800f4
SHA256
9275f8dce280e9723250abbe8c4e2aed8e2cf69f69130fb7c006a61f86271d8b
SHA512
7f7cd60f7f21c2447cacde31b7bbaaa529f1573175c2f5cd388b04eb88430e0add6bd411f5fb04ea7874fe57187d0f7935504c1399a8732af4725dd958925a4b
SSDEEP
24576:2XmjaCu2WrEdGnJR0Y5VR6ZwsqGCXl8kHAJNO:CH2tOP0YLRBsBKl8kgu
Checks for missing Authenticode signature.
resource |
---|
unpack001/FastMM_FullDebugMode.dll |
unpack001/redappleTurnIp.exe |
unpack001/代理IP自动搜索更改器1.0注册机.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
MessageBoxA
LoadStringA
GetSystemMetrics
CharNextA
CharLowerBuffA
CharUpperBuffA
CharToOemA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
WriteFile
WaitForSingleObject
VirtualQueryEx
VirtualQuery
UnmapViewOfFile
SetFilePointer
SetEvent
SetEndOfFile
ResetEvent
ReadFile
OpenProcess
MapViewOfFile
LoadLibraryA
LeaveCriticalSection
IsBadReadPtr
InitializeCriticalSection
GetVersionExA
GetThreadLocale
GetSystemInfo
GetStringTypeExA
GetStdHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameA
GetFileSize
GetFileAttributesA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCPInfo
FreeLibrary
FormatMessageA
EnumCalendarInfoA
EnterCriticalSection
DeleteCriticalSection
CreateFileMappingA
CreateFileA
CreateEventA
CompareStringA
CloseHandle
Sleep
GetVersionExA
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFrameBasedStackTrace
GetRawStackTrace
LogStackTrace
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE