C:\Users\Ваня\Desktop\echozy loader\Release\Load.pdb
Static task
static1
Behavioral task
behavioral1
Sample
чит эчози/Load.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
чит эчози/Load.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
чит эчози/echozy.pw.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
чит эчози/echozy.pw.dll
Resource
win10v2004-20240508-en
General
-
Target
3cc78a0be6003a902e557244d2f6c6c9_JaffaCakes118
-
Size
766KB
-
MD5
3cc78a0be6003a902e557244d2f6c6c9
-
SHA1
ef9b9dd310c320b7784645396a97ca73da30c57d
-
SHA256
8baf46caa830fb742d93342eae93e100e15aeed856006452151ce3df59e804ad
-
SHA512
b48308314f292a3b3f9500e2013fc3f93d12881c48a9012bfbb1d31cbf516f162a7bfda6039f4d3e4bae0ec1bfc51bad998c20044f28df35f2b25a945db99a93
-
SSDEEP
12288:W7Gg8ir82eR7W3B2SCZ2EQ07rZGsqmVE7pTfuzwDsXae4PAkBGv18iwJQ1I4:3g7MRS3B2SU2EbrZGsHmSisXavPAkBMD
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/чит эчози/Load.exe unpack001/чит эчози/echozy.pw.dll
Files
-
3cc78a0be6003a902e557244d2f6c6c9_JaffaCakes118.zip
-
чит эчози/Load.exe.exe windows:6 windows x86 arch:x86
ad7bef6b9edc9f63d74e2c240dcffdd1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFullPathNameA
FindClose
GetModuleFileNameA
SetConsoleTextAttribute
SetConsoleScreenBufferSize
GetStdHandle
TerminateProcess
SetConsoleWindowInfo
GetSystemDefaultLocaleName
Sleep
CopyFileA
FindNextFileA
GetConsoleWindow
Process32First
OpenProcess
CreateToolhelp32Snapshot
GetLastError
Process32Next
CloseHandle
WideCharToMultiByte
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
FindFirstFileA
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
MultiByteToWideChar
user32
FindWindowA
ShowWindow
advapi32
RegGetValueA
oleaut32
SysFreeString
VariantClear
SysAllocString
msvcp140
?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A
??4?$_Yarn@D@std@@QAEAAV01@PBD@Z
??1?$codecvt@_WDU_Mbstatet@@@std@@MAE@XZ
??0?$codecvt@_WDU_Mbstatet@@@std@@QAE@I@Z
?out@?$codecvt@_WDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PB_W1AAPB_WPAD3AAPAD@Z
?_Addfac@_Locimp@locale@std@@AAEXPAVfacet@23@I@Z
?_Decref@facet@locale@std@@UAEPAV_Facet_base@3@XZ
?_Incref@facet@locale@std@@UAEXXZ
??Bid@locale@std@@QAEIXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_New_Locimp@_Locimp@locale@std@@CAPAV123@ABV123@@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@K@Z
?_Init@locale@std@@CAPAV_Locimp@12@_N@Z
?uncaught_exception@std@@YA_NXZ
?_Xlength_error@std@@YAXPBD@Z
shlwapi
PathFileExistsW
vcruntime140
__CxxFrameHandler3
__std_exception_copy
memcpy
__std_terminate
_except_handler4_common
__std_exception_destroy
memset
_CxxThrowException
memmove
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
free
_set_new_mode
api-ms-win-crt-string-l1-1-0
_stricmp
strncmp
api-ms-win-crt-runtime-l1-1-0
_c_exit
_invalid_parameter_noinfo_noreturn
exit
_controlfp_s
terminate
__p___argv
__p___argc
_register_thread_local_exe_atexit_callback
_seh_filter_exe
_cexit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_get_initial_narrow_environment
_exit
_initterm_e
system
_initterm
_set_app_type
api-ms-win-crt-locale-l1-1-0
setlocale
_configthreadlocale
api-ms-win-crt-stdio-l1-1-0
__p__commode
__acrt_iob_func
_set_fmode
__stdio_common_vfprintf_s
api-ms-win-crt-filesystem-l1-1-0
rename
api-ms-win-crt-math-l1-1-0
__setusermatherr
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
чит эчози/echozy.pw.dll.dll windows:6 windows x86 arch:x86
a01d552fabafb8de43667fcdae9993d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetTickCount
GetModuleHandleW
InitializeCriticalSection
DeleteCriticalSection
GetProcAddress
GetStdHandle
WriteConsoleA
ReadConsoleA
Sleep
FreeConsole
SetStdHandle
GetCurrentProcessId
VirtualProtect
GetModuleFileNameA
VirtualQuery
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
QueryPerformanceFrequency
QueryPerformanceCounter
FreeLibraryAndExitThread
DisableThreadLibraryCalls
GetModuleHandleA
GetLastError
WriteConsoleW
HeapSize
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
GetFileSizeEx
GetFileType
GetPrivateProfileStringA
CreateDirectoryA
CreateThread
WritePrivateProfileStringA
HeapAlloc
HeapFree
GetModuleHandleExW
FormatMessageW
WideCharToMultiByte
CreateDirectoryW
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetEndOfFile
SetFilePointerEx
AreFileApisANSI
CloseHandle
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
InitializeSListHead
GetCurrentProcess
TerminateProcess
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibrary
GetModuleFileNameW
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
LoadLibraryW
RtlUnwind
RaiseException
ReadFile
RemoveDirectoryW
DeleteFileW
ExitProcess
user32
SetWindowLongW
CallWindowProcW
FlashWindowEx
SetClipboardData
GetKeyState
ScreenToClient
GetCapture
ClientToScreen
IsChild
GetForegroundWindow
LoadCursorW
SetCapture
SetCursor
GetClientRect
ReleaseCapture
SetCursorPos
GetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
d3dx9_43
D3DXCreateTextureFromFileInMemoryEx
imm32
ImmReleaseContext
ImmSetCompositionWindow
ImmGetContext
xinput1_3
ord2
ord4
Sections
.text Size: 687KB - Virtual size: 686KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 489KB - Virtual size: 488KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 945KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ