??0CHook@@QAE@XZ
??4CHook@@QAEAAV0@ABV0@@Z
?exitHook@@YAXPAUHHOOK__@@@Z
?initHook@@YAPAUHHOOK__@@XZ
?setKbHook@@YAXHH@Z
?setMouseHook@@YAXHH@Z
Overview
overview
7Static
static
7VCDCut_Pro...ok.dll
windows7-x64
3VCDCut_Pro...ok.dll
windows10-2004-x64
3VCDCut_Pro...SP.dll
windows7-x64
3VCDCut_Pro...SP.dll
windows10-2004-x64
3VCDCut_Pro...th.dll
windows7-x64
5VCDCut_Pro...th.dll
windows10-2004-x64
5VCDCut_Pro...ck.exe
windows7-x64
6VCDCut_Pro...ck.exe
windows10-2004-x64
3VCDCut_Pro...me.dll
windows7-x64
5VCDCut_Pro...me.dll
windows10-2004-x64
5Behavioral task
behavioral1
Sample
VCDCut_Pro_v4.16.6/Hook.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
VCDCut_Pro_v4.16.6/Hook.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
VCDCut_Pro_v4.16.6/JiaoDSP.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
VCDCut_Pro_v4.16.6/JiaoDSP.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
VCDCut_Pro_v4.16.6/auth.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
VCDCut_Pro_v4.16.6/auth.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
VCDCut_Pro_v4.16.6/crack.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
VCDCut_Pro_v4.16.6/crack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
VCDCut_Pro_v4.16.6/nLame.dll
Resource
win7-20240903-en
Target
38172cf16d4515b84c704cc266ef2bdc_JaffaCakes118
Size
1.1MB
MD5
38172cf16d4515b84c704cc266ef2bdc
SHA1
98988bbea12c363cd6bec78e713ed044cd805927
SHA256
a877523069f9414ab19147ab6209e794ce88e1ce6e8a3e380806bf31ed086683
SHA512
50d45ac969ef3b1277f351d03b179288f1922f8490111e985b7dbb08b66da3ae0fb1add0a8cfb3ab22698e77efa2ecdfe93deab56f8632ff5c7c99b8b7c2a31f
SSDEEP
24576:ZGCBVljDC4Wo10B56+Rcfng4ZtrIrWUb2l+rexgkhLjtSLKFiEwpVQ:EC3tDIo1w1Rc/g4va1khLjtSuWpK
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/VCDCut_Pro_v4.16.6/auth.dll | acprotect |
static1/unpack001/VCDCut_Pro_v4.16.6/nLame.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/VCDCut_Pro_v4.16.6/JiaoDSP.dll | aspack_v212_v242 |
resource | yara_rule |
---|---|
static1/unpack001/VCDCut_Pro_v4.16.6/auth.dll | upx |
static1/unpack001/VCDCut_Pro_v4.16.6/nLame.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/VCDCut_Pro_v4.16.6/Hook.dll |
unpack001/VCDCut_Pro_v4.16.6/JiaoDSP.dll |
unpack001/VCDCut_Pro_v4.16.6/auth.dll |
unpack002/out.upx |
unpack001/VCDCut_Pro_v4.16.6/crack.exe |
unpack001/VCDCut_Pro_v4.16.6/nLame.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
RtlUnwind
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
SetWindowsHookExA
GetCursor
PostMessageA
CallNextHookEx
UnhookWindowsHookEx
??0CHook@@QAE@XZ
??4CHook@@QAEAAV0@ABV0@@Z
?exitHook@@YAXPAUHHOOK__@@@Z
?initHook@@YAPAUHHOOK__@@XZ
?setKbHook@@YAXHH@Z
?setMouseHook@@YAXHH@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DSPBufferCB
DSPInit
DSPIsEffectBufUsing
DSPRegFlag
DSPSetColorID
DSPSetEffectBuf
DSPSetEffectID
DSPSetID
DSPSetMovieRatio
DSPSetMovieSample
DSPTransferFrame
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
AGID
GetHTL_DOS
GetHTL_WIN
GetRegion
Loadaspi
RPCII
SetRegion
User_changes
Vendor_changes
check_drive_exists
check_if_authorized
drive_authentication
execute_command
generate_drive_info
generate_vendor_name
get_drive_info
return_buf
show_host
show_lun
show_target
show_vendor_name
start_stop_unit
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
nlame_callback_set
nlame_delete
nlame_encode_buffer
nlame_encode_buffer_interleaved
nlame_encode_buffer_mono
nlame_encode_flush
nlame_encode_flush_nogap
nlame_histogram_get
nlame_init_params
nlame_lame_string_get
nlame_lame_version_get
nlame_lame_version_get_num
nlame_lame_version_get_psy_num
nlame_new
nlame_var_get_int
nlame_var_set_int
nlame_write_vbr_infotag
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE