Static task
static1
Behavioral task
behavioral1
Sample
Jakex-Hwid-Spoofer.exe
Resource
win10v2004-20230220-en
General
-
Target
Jakex-Hwid-Spoofer.exe
-
Size
8.5MB
-
MD5
fecd031867690cfa628ee969d9204589
-
SHA1
6ddbc557b9bb491b34a49623034cc912d48e2a8d
-
SHA256
a181bacdd3aa2c03ea44ab41eeea67a51ccd937f8cd0a663b59c957b4c832c77
-
SHA512
ce03b733f97ca6cd80aa3c870e60ecf6a9ae01c1791111c0911212640f57e9ef13536367d530419e47779cc49ccf02dee93c005a544b4ba4dcd1f306e4b6d43f
-
SSDEEP
196608:9PbsU3XV41tHS44F3tC8+9YAo94NdRhvFz41hKAtPiWF91:9TsU3Cxo9C8+lo9gmK2p
Malware Config
Signatures
Files
-
Jakex-Hwid-Spoofer.exe.exe windows x86
a9c887a4f18a3fede2cc29ceea138ed3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
malloc
memset
strcmp
strcpy
getenv
sprintf
fopen
fwrite
fclose
__argc
__argv
_environ
_XcptFilter
__set_app_type
_controlfp
__getmainargs
exit
shell32
ShellExecuteA
kernel32
SetUnhandledExceptionFilter
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8.3MB - Virtual size: 8.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ