g:\11.0.16696.202_for_hive_trunk\basic\output\binfinal\qqgametoolinstall\QQGameToolInstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
abe45cb8c7cc13a065c65a78e6eefca1_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
abe45cb8c7cc13a065c65a78e6eefca1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
abe45cb8c7cc13a065c65a78e6eefca1_JaffaCakes118
-
Size
22.9MB
-
MD5
abe45cb8c7cc13a065c65a78e6eefca1
-
SHA1
4a239828b43355a8d7597f529090ccdf38bb2e74
-
SHA256
b81784122b5c71fd5736b8b81e428199cf77c1dddf283a8413aeb3aadb29e5c4
-
SHA512
3b40c4cbb868d5a314a3c955bd1e1721a12df1dee7c0dd80452e4b7098ea62517080f1686d288099624d5dbb91b4829334011ebb5405435951644588f79f1f89
-
SSDEEP
393216:4IqH1m18Alf9Fe442x1i3NUdOzsVU5wRdy9feq8OvBeO406+gr3HXP2615tJwC8I:4x1m1zt9F342x1i3OMsVQwmfeqLE50T4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abe45cb8c7cc13a065c65a78e6eefca1_JaffaCakes118
Files
-
abe45cb8c7cc13a065c65a78e6eefca1_JaffaCakes118.exe windows:4 windows x86 arch:x86
2a4c79b647db460f6d36a1cd66b3f8c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFullPathNameW
GetModuleFileNameW
DeleteFileW
MoveFileW
CopyFileW
CreateMutexW
ExpandEnvironmentStringsW
CloseHandle
WaitForSingleObject
CreateThread
FindResourceW
LoadResource
CreateDirectoryW
SizeofResource
GetLastError
LockResource
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcess
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteExW
msvcp80
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??$?H_WU?$char_traits@_W@std@@V?$allocator@_W@1@@std@@YA?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@0@ABV10@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
shlwapi
PathFileExistsW
PathIsDirectoryW
PathAddBackslashW
PathRemoveFileSpecW
msvcr80
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
_amsg_exit
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
wcsncpy_s
wcsrchr
fclose
fwrite
??3@YAXPAX@Z
__p__commode
memset
_wfopen
__CxxFrameHandler3
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52.8MB - Virtual size: 52.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ