Static task
static1
Behavioral task
behavioral1
Sample
乡巴佬CS登录器V3.5 [测试].exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
乡巴佬CS登录器V3.5 [测试].exe
Resource
win10v2004-20240508-en
General
-
Target
655b6571790b87480b9637ac09464716_JaffaCakes118
-
Size
493KB
-
MD5
655b6571790b87480b9637ac09464716
-
SHA1
c61abeaa9f28720073c07bb030e66687c117316b
-
SHA256
39bb4676cd16997f2d86bdd451c37b0e0bf6e5d75e837e186a41f6c50eebd534
-
SHA512
19605b2b598bf2158bd106cc18ecb105b2d468cdbcc6a4873d9df5f2074439e4d4e572ae4469c18e7388c7bc8d05572511c49361a3ad5f7f2f3fc1d9470304e5
-
SSDEEP
12288:8R633Ry1C7u8qhkJ/Ihe1aa8Xz2XOz90rZRGUjE0k2:HHA60kBh0ztzurPGUk2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/乡巴佬CS登录器V3.5 [测试].exe
Files
-
655b6571790b87480b9637ac09464716_JaffaCakes118.rar
-
乡巴佬CS登录器V3.5 [测试].exe.exe windows:4 windows x86 arch:x86
4b4a21805141e4a8cfbb37f8754e9034
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord3738
ord561
ord815
ord686
ord692
ord2621
ord1134
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord1768
ord2086
ord1146
ord384
ord5356
ord801
ord6883
ord541
ord4129
ord4278
ord3571
ord3626
ord2414
ord2862
ord1641
ord2096
ord6877
ord4204
ord2863
ord755
ord470
ord4476
ord2841
ord2448
ord2652
ord1669
ord3337
ord3811
ord5710
ord4202
ord941
ord693
ord6283
ord5807
ord5204
ord6426
ord922
ord3301
ord4220
ord2584
ord3654
ord2438
ord6270
ord1644
ord3499
ord2515
ord355
ord2044
ord2107
ord5450
ord5834
ord6394
ord5981
ord2582
ord4402
ord3370
ord3640
ord3996
ord6007
ord3998
ord536
ord6907
ord5683
ord6334
ord2408
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord616
ord3317
ord6385
ord2803
ord6010
ord798
ord1997
ord5465
ord532
ord5194
ord533
ord6648
ord940
ord4622
ord5773
ord5442
ord352
ord3619
ord809
ord556
ord4275
ord6358
ord1088
ord2122
ord2860
ord3873
ord3797
ord3089
ord5875
ord6197
ord802
ord542
ord5601
ord1085
ord6929
ord6662
ord6282
ord668
ord1980
ord6569
ord3181
ord4058
ord2781
ord2770
ord5622
ord356
ord713
ord6141
ord414
ord6880
ord613
ord5789
ord289
ord3706
ord5781
ord5859
ord2754
ord2567
ord5873
ord6172
ord5440
ord6383
ord4400
ord3630
ord682
ord640
ord2450
ord5678
ord4133
ord4297
ord5788
ord472
ord283
ord5786
ord5736
ord1640
ord323
ord2740
ord2801
ord4243
ord6242
ord6696
ord3286
ord703
ord603
ord1969
ord273
ord404
ord3520
ord6401
ord2454
ord403
ord1949
ord818
ord2152
ord1233
ord2243
ord5785
ord2380
ord1871
ord3178
ord4406
ord3729
ord804
ord4267
ord4284
ord2859
ord6605
ord859
ord2764
ord4277
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord1576
ord4274
ord4673
ord3092
ord2642
ord6453
ord1168
ord268
ord1567
ord926
ord1147
ord4160
ord4299
ord6215
ord4287
ord3790
ord1148
ord1105
ord602
ord3567
ord1816
ord2379
ord389
ord5207
ord3810
ord535
ord1988
ord690
ord920
ord924
ord6199
ord2393
ord350
ord860
ord5186
ord3318
ord1979
ord3663
ord3616
ord3127
ord5651
ord6663
ord939
ord858
ord540
ord354
ord665
ord765
ord3698
ord537
ord2864
ord3874
ord823
ord2915
ord3803
ord5572
ord4224
ord2645
ord2818
ord800
ord4710
ord4234
ord2302
ord656
ord825
ord324
ord567
ord641
ord609
ord795
ord3721
ord4424
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord3402
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1776
ord4078
ord6055
ord3574
ord4396
ord2575
ord3610
ord3597
ord4425
ord5280
ord1775
ord6052
ord2514
ord4998
ord4853
ord4376
ord3215
ord5265
msvcrt
_strcmpi
_mkdir
_setmbcp
_makepath
_splitpath
strrchr
_strdup
_strnicmp
strchr
strstr
fwrite
ftell
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
__CxxFrameHandler
atoi
_mbscmp
_beginthreadex
strtok
rand
_ftol
sprintf
free
wcscmp
malloc
_mbsnbicmp
memchr
isalnum
_CxxThrowException
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
fclose
fseek
fread
fopen
isalpha
calloc
printf
wcslen
_ismbcdigit
fprintf
_iob
_chdrive
_getdrive
_utime
_stat
toupper
memmove
kernel32
GetTimeFormatA
ReadFile
GetDriveTypeA
GlobalAlloc
GlobalLock
GlobalUnlock
WideCharToMultiByte
lstrcpyA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetFileSize
CreateFileMappingA
MapViewOfFile
GetLogicalDriveStringsA
QueryDosDeviceA
UnmapViewOfFile
OutputDebugStringA
TerminateProcess
GetCurrentProcess
lstrlenA
MultiByteToWideChar
RemoveDirectoryA
CreateFileA
FindResourceA
LoadResource
SizeofResource
WriteFile
FlushFileBuffers
LoadLibraryA
GetProcAddress
GetModuleHandleA
SetUnhandledExceptionFilter
ExitProcess
CreateProcessA
GetTempPathA
GetDateFormatA
SetThreadPriority
Sleep
CloseHandle
GetLastError
DeleteFileA
TerminateThread
WaitForSingleObject
GetExitCodeThread
GetTickCount
CreateDirectoryA
ResumeThread
WaitForMultipleObjects
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
EnterCriticalSection
lstrcmpA
GetVersion
CopyFileA
HeapFree
HeapAlloc
GetProcessHeap
GetDiskFreeSpaceA
GetVolumeInformationA
GetFileAttributesA
FindClose
FindFirstFileA
SetFileAttributesA
FindNextFileA
GetFullPathNameA
lstrcmpiA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrcatA
GetStartupInfoA
GetSystemTime
VirtualFree
VirtualAlloc
LockResource
GetVersionExA
GetSystemDirectoryA
GetModuleFileNameA
QueryPerformanceFrequency
QueryPerformanceCounter
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenProcess
lstrcpynA
IsBadCodePtr
FileTimeToSystemTime
IsBadReadPtr
FileTimeToLocalFileTime
GetFileTime
GetCurrentProcessId
GetCurrentThreadId
DeviceIoControl
FreeLibrary
GetWindowsDirectoryA
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateEventA
GlobalFree
MulDiv
ResetEvent
SetEvent
CreateThread
DeleteCriticalSection
InitializeCriticalSection
user32
SetWindowRgn
GetSysColorBrush
DrawTextA
InflateRect
CopyRect
GetSysColor
FillRect
GetDC
ReleaseDC
SetRect
SetWindowLongA
PtInRect
ReleaseCapture
IsWindow
GetMenuItemID
TrackPopupMenu
SetForegroundWindow
RedrawWindow
SetCapture
LoadImageA
PostQuitMessage
MoveWindow
ShowWindow
EnableWindow
SendMessageA
GetParent
SetMenuDefaultItem
ScreenToClient
PostMessageA
UpdateWindow
LoadIconA
LoadBitmapA
SetTimer
AppendMenuA
GetSystemMenu
DrawIcon
GetClientRect
TranslateMessage
IsDialogMessageA
DispatchMessageA
PeekMessageA
SystemParametersInfoA
GetSystemMetrics
IsIconic
GetDesktopWindow
GetWindow
GetWindowThreadProcessId
GetTopWindow
InvalidateRect
GetWindowRect
FindWindowA
GetWindowDC
MessageBeep
wsprintfA
GetSubMenu
LoadMenuA
GetCursorPos
KillTimer
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
SetCursor
LoadCursorA
MessageBoxA
gdi32
CreateRectRgn
CombineRgn
CreateRectRgnIndirect
GetTextExtentPoint32A
CreateSolidBrush
DeleteDC
GetStockObject
GetObjectA
CreateFontIndirectA
GetDeviceCaps
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
TextOutA
DeleteObject
GetDIBits
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCreateKeyA
RegCloseKey
RegSetValueExA
OpenProcessToken
shell32
Shell_NotifyIconA
SHGetFileInfoA
ShellExecuteA
comctl32
ImageList_ReplaceIcon
_TrackMouseEvent
ImageList_Draw
ImageList_AddMasked
ImageList_GetImageInfo
ole32
CreateStreamOnHGlobal
CoInitialize
olepro32
ord251
urlmon
URLDownloadToFileA
gdiplus
GdipAlloc
GdipCloneImage
GdipFree
GdipCreateBitmapFromHBITMAP
GdipGetImageGraphicsContext
GdipScaleWorldTransform
GdipDrawImageI
GdipSaveImageToFile
GdipDeleteGraphics
GdipDisposeImage
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusStartup
GdipCreateBitmapFromScan0
ws2_32
connect
WSAAsyncSelect
shutdown
closesocket
htons
WSAGetLastError
WSAStartup
gethostname
WSACleanup
inet_addr
ioctlsocket
getservbyname
socket
gethostbyaddr
gethostbyname
WSASendTo
send
recvfrom
sendto
setsockopt
inet_ntoa
WSARecvFrom
recv
WSASocketA
msvcp60
?_Xlen@std@@YAXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IPBDI@Z
??0logic_error@std@@QAE@ABV01@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1out_of_range@std@@UAE@XZ
??_7out_of_range@std@@6B@
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
winmm
timeGetDevCaps
timeSetEvent
timeBeginPeriod
timeKillEvent
shlwapi
PathFileExistsA
wininet
InternetCloseHandle
FtpOpenFileA
InternetReadFile
InternetWriteFile
InternetGetLastResponseInfoA
FtpFindFirstFileA
InternetConnectA
InternetOpenA
InternetSetStatusCallback
psapi
EnumProcesses
GetMappedFileNameA
msvcirt
??0ifstream@@QAE@XZ
?open@ifstream@@QAEXPBDHH@Z
?read@istream@@QAEAAV1@PADH@Z
?close@ifstream@@QAEXXZ
??1ifstream@@UAE@XZ
??1ios@@UAE@XZ
??_Difstream@@QAEXXZ
?sh_read@filebuf@@2HB
Sections
.text Size: 288KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ