Static task
static1
Behavioral task
behavioral1
Sample
8 Ball Pool_[unknowncheats.me]_.exe
Resource
win10v2004-20230220-en
General
-
Target
8 Ball Pool_[unknowncheats.me]_.exe
-
Size
576KB
-
MD5
4878e4addfccef1690398281d5410043
-
SHA1
7d0bfc36b13fdf7e7b654a73ae5bda84c69a1303
-
SHA256
398379d1da73098fb9b3f53f25ee191b681500470ea167eb4d90fbd6a83a359d
-
SHA512
8633822a3bfb9c8313f01315a5e52180ca55871227bbc0ba2a7592ebce6d1b1ff2992b02b7c77d94a76951c5a9ad67a34f9d3d459bf250d7b6ccd969f22625de
-
SSDEEP
12288:FAQ2fhSMXlCphqZ+G0oM6yQUJ2EAcLCXqkxzhsKOP:CQ2fhSMXlohmtaQUUlq/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8 Ball Pool_[unknowncheats.me]_.exe
Files
-
8 Ball Pool_[unknowncheats.me]_.exe.exe windows x86
a9a2f01c7ceac943e115427314efe937
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
Process32First
WriteProcessMemory
OpenProcess
CreateToolhelp32Snapshot
CloseHandle
Process32Next
ReadProcessMemory
VirtualQueryEx
LocalFree
FormatMessageA
IsProcessorFeaturePresent
GetLastError
Sleep
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCPInfoExW
CreateThread
UnhandledExceptionFilter
user32
DefWindowProcA
EnumWindows
GetClientRect
RegisterClassA
PostQuitMessage
GetForegroundWindow
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
FindWindowA
FindWindowExA
SetTimer
IsWindow
GetSystemMetrics
GetWindowRect
GetWindowInfo
MessageBoxA
ShowWindow
CreateWindowExA
SetWindowPos
SetLayeredWindowAttributes
DestroyWindow
GetWindowThreadProcessId
IsIconic
msvcp140
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
?_Init@locale@std@@CAPAV_Locimp@12@_N@Z
?_Xbad_alloc@std@@YAXXZ
?id@?$numpunct@D@std@@2V0locale@2@A
??1facet@locale@std@@MAE@XZ
??0facet@locale@std@@IAE@I@Z
?_Decref@facet@locale@std@@UAEPAV_Facet_base@3@XZ
?_Incref@facet@locale@std@@UAEXXZ
??Bid@locale@std@@QAEIXZ
?_Gettrue@_Locinfo@std@@QBEPBDXZ
?_Getfalse@_Locinfo@std@@QBEPBDXZ
?_Getlconv@_Locinfo@std@@QBEPBUlconv@@XZ
?_Getcvt@_Locinfo@std@@QBE?AU_Cvtvec@@XZ
??1_Locinfo@std@@QAE@XZ
??0_Locinfo@std@@QAE@PBD@Z
?_Xout_of_range@std@@YAXPBD@Z
??0_Lockit@std@@QAE@H@Z
_Mbrtowc
??1_Lockit@std@@QAE@XZ
?_Xlength_error@std@@YAXPBD@Z
vcruntime140
memmove
memcpy
_CxxThrowException
memset
_except_handler4_common
__current_exception_context
__current_exception
__std_exception_copy
__std_exception_destroy
__std_terminate
__CxxFrameHandler3
memchr
api-ms-win-crt-string-l1-1-0
toupper
strncmp
api-ms-win-crt-heap-l1-1-0
malloc
_set_new_mode
calloc
free
_callnewh
api-ms-win-crt-runtime-l1-1-0
terminate
_configure_narrow_argv
_initialize_onexit_table
_invalid_parameter_noinfo_noreturn
_initterm_e
_register_onexit_function
_crt_atexit
_controlfp_s
_register_thread_local_exe_atexit_callback
_c_exit
__p___argv
__p___argc
_cexit
_exit
exit
_initialize_narrow_environment
_initterm
_get_initial_narrow_environment
_set_app_type
_seh_filter_exe
api-ms-win-crt-math-l1-1-0
_fdsign
_ldclass
_dsign
_libm_sse2_cos_precise
_libm_sse2_sin_precise
_dclass
_CIatan2
_ldsign
_libm_sse2_sqrt_precise
__setusermatherr
_fdclass
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-time-l1-1-0
clock
d2d1
ord1
dwmapi
DwmExtendFrameIntoClientArea
dwrite
DWriteCreateFactory
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 362KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ