g:\11.0.16696.202_for_hive_trunk\Basic\Output\BinFinal\QQGameToolInstall\QQGameToolInstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a5733859624405f81f4df5296457512a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a5733859624405f81f4df5296457512a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
a5733859624405f81f4df5296457512a_JaffaCakes118
-
Size
15.4MB
-
MD5
a5733859624405f81f4df5296457512a
-
SHA1
c68f39daf7859ddfeb93044e73c4cf5d75990ee1
-
SHA256
94e6bed679720d6af1e2840613c4f009a454b39fe975a511b361c7e71988fb40
-
SHA512
6aac2f69a401d1676422b2dd7ba7c07a7a48bc095265524b1a8dd06c89d3c897a68b7e46b75d423b48850d3ad6700569aee3c7f0501d9440de63bb27c78a61c7
-
SSDEEP
393216:/IqH1m18Alf9Fe442x1i3NUdOzsVU5wRdy9feq8OvBea:/x1m1zt9F342x1i3OMsVQwmfeqLEa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5733859624405f81f4df5296457512a_JaffaCakes118
Files
-
a5733859624405f81f4df5296457512a_JaffaCakes118.exe windows:4 windows x86 arch:x86
2a4c79b647db460f6d36a1cd66b3f8c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFullPathNameW
GetModuleFileNameW
DeleteFileW
MoveFileW
CopyFileW
CreateMutexW
ExpandEnvironmentStringsW
CloseHandle
WaitForSingleObject
CreateThread
FindResourceW
LoadResource
CreateDirectoryW
SizeofResource
GetLastError
LockResource
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcess
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteExW
msvcp80
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??$?H_WU?$char_traits@_W@std@@V?$allocator@_W@1@@std@@YA?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@0@ABV10@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
shlwapi
PathFileExistsW
PathIsDirectoryW
PathAddBackslashW
PathRemoveFileSpecW
msvcr80
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
_amsg_exit
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
wcsncpy_s
wcsrchr
fclose
fwrite
??3@YAXPAX@Z
__p__commode
memset
_wfopen
__CxxFrameHandler3
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53.1MB - Virtual size: 53.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ