InstHookProc
UnInstHookProc
Overview
overview
7Static
static
7920J传奇网.url
windows7-x64
1920J传奇网.url
windows10-2004-x64
1JSY.dll
windows7-x64
3JSY.dll
windows10-2004-x64
3Jsy.exe
windows7-x64
5Jsy.exe
windows10-2004-x64
5WGSHELL.dll
windows7-x64
5WGSHELL.dll
windows10-2004-x64
5jsy.exe
windows7-x64
5jsy.exe
windows10-2004-x64
5加速器下载.url
windows7-x64
1加速器下载.url
windows10-2004-x64
1外挂下载.url
windows7-x64
1外挂下载.url
windows10-2004-x64
1登陆器下载.url
windows7-x64
1登陆器下载.url
windows10-2004-x64
1Behavioral task
behavioral1
Sample
920J传奇网.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
920J传奇网.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
JSY.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
JSY.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Jsy.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Jsy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
WGSHELL.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
WGSHELL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
jsy.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
jsy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
加速器下载.url
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
加速器下载.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
外挂下载.url
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
外挂下载.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
登陆器下载.url
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
登陆器下载.url
Resource
win10v2004-20241007-en
Target
3bfad05cfa278ae98216407e03b01bb8_JaffaCakes118
Size
1.0MB
MD5
3bfad05cfa278ae98216407e03b01bb8
SHA1
182ae9fabe7d265941185f84c61c0c0f5de02703
SHA256
7babc8dfb53bd1039370a045666963335096ef26831301d7d035a03140fb1844
SHA512
172df123d86b9bcf31a0093c3d167dd2156162f9b5ee7ce2e9a5ecba24fe9dce15d768868c85c1ca577e0c8b4a5b274b5049cccd4b9492089f74d1857db1f48f
SSDEEP
24576:eA/iGEntepKw9LA+J/NFckf0bhrlzHlET9bap3qTiyZz8WOCns1R9QN7x9ShB:BcnwKyL5X8tpzHOT9baETnptjnYm9G
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/WGSHELL.DLL | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/JSY.dll | aspack_v212_v242 |
static1/unpack001/Jsy.exe | aspack_v212_v242 |
static1/unpack001/jsy.dat | aspack_v212_v242 |
resource | yara_rule |
---|---|
static1/unpack001/WGSHELL.DLL | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/JSY.dll |
unpack001/Jsy.exe |
unpack001/WGSHELL.DLL |
unpack001/jsy.dat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InstHookProc
UnInstHookProc
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeRegisterShell
RegisterShell
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE