Static task
static1
Behavioral task
behavioral1
Sample
9553下载站.url
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9553下载站.url
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
游戏攻略教程 - 9553资讯.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
游戏攻略教程 - 9553资讯.url
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
破解版熊猫26A/拉布拉多论坛-网络验证通杀器.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
破解版熊猫26A/拉布拉多论坛-网络验证通杀器.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
破解版熊猫26A/熊猫透视自瞄26日A.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
破解版熊猫26A/熊猫透视自瞄26日A.exe
Resource
win10v2004-20240412-en
General
-
Target
003af85838e27efbcbe732745725cdc1_JaffaCakes118
-
Size
8.8MB
-
MD5
003af85838e27efbcbe732745725cdc1
-
SHA1
eaf7e0e05827a02590c4b8a7d92eb6f36f4ee729
-
SHA256
f065944d41079c9c868426b408f39ae6525914929f150d3a2e2b19d94efe1322
-
SHA512
9dfe31e9ecefdccbe2c44b9a8610943def04ee80e34162f01cf1c97a62aa2e349778861750a7aa1aa30c95908d4e1ef2a1e650f2ccf3462734f669b190af98d8
-
SSDEEP
196608:agZ9pJfCTOFYCwCbQobdaQXEYTQtSTiEFrDoqleMuRCRGglbkyT:agZ9psdC1brbHPEtyi4r0qlerOGFyT
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/破解版熊猫26A/拉布拉多论坛-网络验证通杀器.exe unpack001/破解版熊猫26A/熊猫透视自瞄26日A.exe
Files
-
003af85838e27efbcbe732745725cdc1_JaffaCakes118.rar
-
9553下载站.url.url
-
游戏攻略教程 - 9553资讯.url.url
-
破解版熊猫26A/拉布拉多论坛-网络验证通杀器.exe.exe windows:4 windows x86 arch:x86
9165ea3e914e03bda3346f13edbd6ccd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
WriteFile
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetStringTypeA
LCMapStringW
LCMapStringA
HeapAlloc
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeW
user32
MessageBoxA
wsprintfA
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
破解版熊猫26A/熊猫透视自瞄26日A.exe.exe windows:4 windows x86 arch:x86
2f8ad4ef353932ab49f38f587ddc6f73
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamOut
ws2_32
closesocket
rasapi32
RasGetConnectStatusA
kernel32
GetFileSize
user32
GetMessagePos
gdi32
Escape
winspool.drv
DocumentPropertiesA
advapi32
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
ole32
CLSIDFromString
oleaut32
LoadTypeLi
comctl32
ord17
wininet
InternetCloseHandle
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 5.4MB - Virtual size: 6.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ