?StartInject@@YAIPAUHWND__@@0@Z
?StopInject@@YAIPAUHWND__@@@Z
Overview
overview
6Static
static
3VLAuto4F 2...vn.sys
windows7-x64
1VLAuto4F 2...vn.sys
windows10-2004-x64
1VLAuto4F 2...4F.dll
windows7-x64
3VLAuto4F 2...4F.dll
windows10-2004-x64
3VLAuto4F 2...4F.chm
windows7-x64
1VLAuto4F 2...4F.chm
windows10-2004-x64
1VLAuto4F 2...4F.exe
windows7-x64
6VLAuto4F 2...4F.exe
windows10-2004-x64
6VLAuto4F 2...DD.exe
windows7-x64
3VLAuto4F 2...DD.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
VLAuto4F 2.73/Ohm_vn.sys
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
VLAuto4F 2.73/Ohm_vn.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
VLAuto4F 2.73/VLAuto4F 2.73/Hook4F.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
VLAuto4F 2.73/VLAuto4F 2.73/Hook4F.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
VLAuto4F 2.73/VLAuto4F 2.73/VLAuto4F.chm
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
VLAuto4F 2.73/VLAuto4F 2.73/VLAuto4F.chm
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
VLAuto4F 2.73/VLAuto4F 2.73/VLAuto4F.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
VLAuto4F 2.73/VLAuto4F 2.73/VLAuto4F.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
VLAuto4F 2.73/Virtual HDD.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
VLAuto4F 2.73/Virtual HDD.exe
Resource
win10v2004-20241007-en
Target
543d967b277213030a2bbf85583fe6b7_JaffaCakes118
Size
350KB
MD5
543d967b277213030a2bbf85583fe6b7
SHA1
ce315cebd7139a6ab1f40010c5cfcb485e7439b0
SHA256
b137755322e18aef74663c4a993feeb4044d53501bf3470e38119c6a3b0f44c1
SHA512
4b24fa9abb855430aa6ba6cd2c22f503ec9635d83916f6e5c3d5633d09a1b52d618fbbda4d84492cb064ee1482c47dddaae22cb57aebb194172afb0d205de898
SSDEEP
6144:adGqdK5aFph/rh+7KMdXfvhtXwjXRRPwbVYoEeogVTifIzKjef:aJ80XhAKMdPo6bGoEtgVOfIGef
Checks for missing Authenticode signature.
resource |
---|
unpack001/VLAuto4F 2.73/Ohm_vn.sys |
unpack001/VLAuto4F 2.73/VLAuto4F 2.73/Hook4F.dll |
unpack001/VLAuto4F 2.73/VLAuto4F 2.73/VLAuto4F.exe |
unpack001/VLAuto4F 2.73/Virtual HDD.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExAllocatePoolWithTag
ExFreePoolWithTag
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
RtlFillMemory
RtlZeroMemory
ZwQuerySystemInformation
sprintf
strcpy
strlen
strncpy
KeServiceDescriptorTable
DbgPrint
IofCompleteRequest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
?StartInject@@YAIPAUHWND__@@0@Z
?StopInject@@YAIPAUHWND__@@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
PlaySoundW
?StartInject@@YAIPAUHWND__@@0@Z
SetRect
ExtSelectClipRgn
GetFileTitleW
DocumentPropertiesW
RegDeleteKeyW
Shell_NotifyIconW
InitCommonControlsEx
PathIsUNCW
OleUIBusyW
CoTaskMemFree
SysAllocString
htonl
GetModuleBaseNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ControlService
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
StartServiceA
CloseServiceHandle
CloseHandle
CreateFileA
DeviceIoControl
ExitProcess
GetCurrentDirectoryA
GetLastError
GetModuleHandleA
lstrlenA
wsprintfA
CheckDlgButton
DialogBoxParamA
EnableWindow
EndDialog
GetDlgItem
GetDlgItemTextA
MessageBoxA
PostQuitMessage
SendMessageA
SetWindowTextA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE