Static task
static1
Behavioral task
behavioral1
Sample
Yakuza 0 v1.0-v20190311 Plus 26 Trainer.exe
Resource
win10v2004-20230220-en
General
-
Target
Yakuza_0_v1.0-v20190311_Plus_26_Trainer.zips
-
Size
868KB
-
MD5
32bbc267ab311962512ada877b036dea
-
SHA1
ca3c846842e0fd7b5d02856e9c788dd2624bdede
-
SHA256
36cdfd1dfc7cbdffea0f55affca30bccf650b01e3c875a71dd3b30e28c49af2b
-
SHA512
b88e276b4d3948ae67a1748a5fe0d196c88d44fa161228c135bdfe48bd0cbfbbce973b5e09cbd854afad3fd074a3da63e9dca15383dace30cc2fddd2172d4957
-
SSDEEP
12288:Rejnk3iOlR4F5Yy84kcOCRycTCrIquTzZhWAqvEmJB4cXu+g1BVyYtjgkPwKjumK:Rejn4lAyt4nN5qchWvcO4ou+kVyuPXyF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Yakuza 0 v1.0-v20190311 Plus 26 Trainer.exe
Files
-
Yakuza_0_v1.0-v20190311_Plus_26_Trainer.zips.zip
-
Yakuza 0 v1.0-v20190311 Plus 26 Trainer.exe.exe windows x64
f2056f8339115ad06f2632bdd42f4f82
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemDirectoryW
HeapFree
InitializeCriticalSectionEx
HeapSize
GetLastError
HeapReAlloc
RaiseException
HeapAlloc
DecodePointer
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
FindResourceW
SizeofResource
LoadResource
GlobalAlloc
GlobalLock
GlobalUnlock
FreeResource
LockResource
CreateFileW
GetModuleFileNameW
GetCurrentProcess
FreeLibrary
IsWow64Process
GetNativeSystemInfo
GetSystemInfo
SetLastError
ResumeThread
WaitForSingleObject
GetPrivateProfileStringW
WritePrivateProfileStringW
GetFileAttributesW
LoadLibraryExA
VirtualQuery
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
CreateFileMappingW
GetDateFormatW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
WriteFile
GetStdHandle
ExitProcess
GetModuleHandleExW
ExitThread
GetModuleHandleA
LoadLibraryA
GetProcAddress
LoadLibraryW
GetCurrentProcessId
Sleep
MapViewOfFile
CreateDirectoryW
RtlPcToFileHeader
RtlUnwindEx
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualProtect
VirtualAlloc
GetVersionExW
LoadLibraryExW
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
ResetEvent
UnmapViewOfFile
GetTimeFormatW
CloseHandle
SetEvent
GetCPInfo
GetLocaleInfoW
LCMapStringW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThread
GetCurrentThreadId
TryEnterCriticalSection
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
EncodePointer
QueryPerformanceCounter
CompareStringW
user32
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
PostMessageW
LoadCursorW
CreateWindowExW
SendMessageW
MessageBoxW
MessageBoxA
SystemParametersInfoW
LoadIconW
RegisterClassExW
GetSystemMetrics
SetWindowLongPtrW
ShowWindow
UpdateWindow
GetDC
GetWindowRect
UpdateLayeredWindow
ReleaseDC
GetWindowLongPtrW
DefWindowProcW
SetLayeredWindowAttributes
BeginPaint
EndPaint
PostQuitMessage
SetTimer
SetCursor
KillTimer
ReleaseCapture
MoveWindow
LoadAcceleratorsW
gdi32
DeleteDC
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
CreateFontIndirectW
shell32
SHGetFolderPathW
ole32
CreateStreamOnHGlobal
gdiplus
GdipDeleteFont
GdipDeleteBrush
GdipAlloc
GdipCloneBrush
GdipCreateImageAttributes
GdipDisposeImageAttributes
GdipSetImageAttributesColorMatrix
GdipGetImageWidth
GdipGetImageHeight
GdipCreateTexture
GdipCreateTextureIAI
GdipSetTextureWrapMode
GdipTranslateTextureTransform
GdipFillRectangleI
GdiplusStartup
GdiplusShutdown
GdipCreateBitmapFromStream
GdipCloneImage
GdipDisposeImage
GdipGetTextureImage
GdipCreateFont
GdipGetGenericFontFamilySansSerif
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipCreateSolidFill
GdipCloneStringFormat
GdipStringFormatGetGenericTypographic
GdipSetStringFormatFlags
GdipSetSolidFillColor
GdipMeasureString
GdipDrawString
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetStringFormatAlign
GdipFree
comctl32
InitCommonControlsEx
_TrackMouseEvent
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 557KB - Virtual size: 557KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 199KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 768KB - Virtual size: 767KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ