_IsSpyActivated@0
_SetupSpy@4
_UnloadSpy@4
Behavioral task
behavioral1
Sample
SanIXPKCheat.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SanIXPKCheat.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
SanIXSpy.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
SanIXSpy.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
三国志IX中文版战斗作弊器使用手册.htm
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
三国志IX中文版战斗作弊器使用手册.htm
Resource
win10v2004-20220812-en
Target
abd65fccaea48ca87d798ff4341b686736bf69cd5101bb29bb5b3c419f22b1e9
Size
3.0MB
MD5
fb1dc6456b99a24e388ab302510ae0b0
SHA1
ef132ea205c6c731a42428b94e9d3fef52b0f784
SHA256
abd65fccaea48ca87d798ff4341b686736bf69cd5101bb29bb5b3c419f22b1e9
SHA512
019a7c58a30af01b13d8ff030c22a8443c9d8d10dbc48c7feba1dabc7214288dc4f94271ee7d2fa42d501bc4f13f23db2d8a6d412a5fe84020e25238b534d1d3
SSDEEP
49152:0gANx5viO1m2zn/dpa7d5ayX6XzPgEd7ayScxIGDdVocVImS2Eu8GmeOclHAZ7:0r5vn1mw/LeayyzWiISoKctGmtclHG7
resource | yara_rule |
---|---|
static1/unpack001/SanIXPKCheat.exe | aspack_v212_v242 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
OpenSemaphoreA
Sleep
FreeLibrary
LoadLibraryA
MapViewOfFile
OpenFileMappingA
UnmapViewOfFile
GetModuleHandleA
GetSystemInfo
VirtualProtectEx
WriteProcessMemory
ReadProcessMemory
OpenProcess
CreateSemaphoreA
CallNextHookEx
PostThreadMessageA
SetWindowsHookExA
GetWindowThreadProcessId
FindWindowA
UnhookWindowsHookEx
_IsSpyActivated@0
_SetupSpy@4
_UnloadSpy@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ