ChenAiMain
TianYuMain
lch
xjm
Overview
overview
10Static
static
10kadmin_gpx...��.cmd
windows7-x64
1kadmin_gpx...��.cmd
windows10-2004-x64
7kadmin_gpx...��.exe
windows7-x64
7kadmin_gpx...��.exe
windows10-2004-x64
7kadmin_gpx...in.exe
windows7-x64
1kadmin_gpx...in.exe
windows10-2004-x64
3kadmin_gpx...in.dll
windows7-x64
3kadmin_gpx...in.dll
windows10-2004-x64
3kadmin_gpx...��.exe
windows7-x64
7kadmin_gpx...��.exe
windows10-2004-x64
7kadmin_gpx...��.url
windows7-x64
1kadmin_gpx...��.url
windows10-2004-x64
1Behavioral task
behavioral1
Sample
kadmin_gpxz/!)使用说明.cmd
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kadmin_gpxz/!)使用说明.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
kadmin_gpxz/kadmin/Kadmin远程管理系统.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
kadmin_gpxz/kadmin/Kadmin远程管理系统.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
kadmin_gpxz/kadmin/kadmin.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
kadmin_gpxz/kadmin/kadmin.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
kadmin_gpxz/kadmin/kadmin.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
kadmin_gpxz/kadmin/kadmin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
kadmin_gpxz/kadmin远程管理系统.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
kadmin_gpxz/kadmin远程管理系统.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
kadmin_gpxz/谷普下载.url
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
kadmin_gpxz/谷普下载.url
Resource
win10v2004-20241007-en
Target
2c61ba9ce3c1991ebec341ee9c8312f5_JaffaCakes118
Size
2.1MB
MD5
2c61ba9ce3c1991ebec341ee9c8312f5
SHA1
3319c01f727bea3e1f86a544daa828fa4e39479c
SHA256
f6d5ebbadbaa5f18ae0ceaef24cf9eb6fb377f6b63dbfc97ec3a42351b0ea961
SHA512
96a74ead41acee93de192f4571cef34c8f2fd9e449fd9f5489601f522c66db4f33e87bb9e2c5ba5c712f0aec2c38cb34a9a404dd8d207fe6159d75b02c7eaf84
SSDEEP
49152:2jIYlCBqH4uOL4TRgllzu6Wx9LjrRh2j1qu6+36re/SBSSC:2jIYldNyanxpjrRUH6ve44
resource | yara_rule |
---|---|
static1/unpack001/kadmin_gpxz/kadmin/kadmin.dll | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
unpack001/kadmin_gpxz/kadmin/Kadmin远程管理系统.exe |
unpack001/kadmin_gpxz/kadmin/kadmin.dat |
unpack001/kadmin_gpxz/kadmin/kadmin.dll |
unpack001/kadmin_gpxz/kadmin远程管理系统.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LocalAlloc �
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
ReadFile
SetFilePointer
CreateFileA
GetProcAddress
LoadLibraryA
lstrcmpiA
Process32Next
Process32First
WinExec
MoveFileExA
DeleteFileA
GetFileAttributesA
lstrcatA
GetSystemDirectoryA
ReleaseMutex
GetLastError
CreateMutexA
GetCommandLineA
lstrlenA
GetModuleHandleA
CreateThread
MoveFileA
FreeResource
WriteFile
LoadResource
FindResourceA
GetTickCount
GetTempPathA
FreeLibrary
LocalAlloc
InterlockedExchange
RaiseException
HeapReAlloc
HeapAlloc
RtlUnwind
GetStartupInfoA
GetVersion
ExitProcess
HeapFree
VirtualFree
VirtualAlloc
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetStdHandle
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateEventA
CloseHandle
GetProcAddress
LoadLibraryA
ResumeThread
WaitForSingleObject
SetEvent
DeleteCriticalSection
EnterCriticalSection
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
RemoveDirectoryA
FindNextFileA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetTickCount
GetModuleFileNameA
SetLastError
GetVersionExA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FreeLibrary
OpenProcess
LeaveCriticalSection
InitializeCriticalSection
GetLocalTime
WinExec
GlobalFree
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalSize
TerminateProcess
TerminateThread
WaitForMultipleObjects
DeviceIoControl
GlobalMemoryStatus
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
FreeConsole
Process32First
lstrcmpiA
Process32Next
GetCurrentThreadId
RaiseException
fclose
fseek
fwrite
fopen
strncpy
atoi
strncmp
strchr
_errno
strrchr
_mbsupr
rename
strncat
realloc
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
_except_handler3
malloc
free
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
_mbsstr
??3@YAXPAX@Z
_strnicmp
_strnset
??2@YAPAXI@Z
_strcmpi
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
ICSeqCompressFrame
ChenAiMain
TianYuMain
lch
xjm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcatA �
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ