?SetQQHook@@YGHPAUHWND__@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
cvery.comvc61544667824/exe/1sass.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cvery.comvc61544667824/exe/1sass.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
cvery.comvc61544667824/exe/uiQQ盗.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
cvery.comvc61544667824/exe/uiQQ盗.exe
Resource
win10v2004-20240704-en
General
-
Target
276edb6c84e141afd55d8cd68afb11bd_JaffaCakes118
-
Size
24KB
-
MD5
276edb6c84e141afd55d8cd68afb11bd
-
SHA1
6ebffbbf021f4987cb03553dc9c15b8e4870b1ce
-
SHA256
a36472a76e10fcc53afbcc8ecd7430c5e2c309964fd456348f8474aac02d9dc9
-
SHA512
b897fb9cbca1824b6a43973bdcfc22e0ffb95b09dbe785cd2c3ad8990d28075f875c4d813b0ce5695e3d328e698d1f2a5db6d0b3db2cd3fe44aadd19f716f9f2
-
SSDEEP
384:OBEa8J+O7onxNZazyPuu/+WhwZHEGxNNK/tyiPhlm5Wcyj95IpLVMV:OihQO7onxNLH/iriyQ45W5fy8
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/cvery.comvc61544667824/exe/1sass.dll unpack001/cvery.comvc61544667824/exe/uiQQ盗.exe
Files
-
276edb6c84e141afd55d8cd68afb11bd_JaffaCakes118.rar
-
cvery.comvc61544667824/code/UiHook.cpp
-
cvery.comvc61544667824/code/uiQQ.cpp
-
cvery.comvc61544667824/exe/1sass.dll.dll windows:4 windows x86 arch:x86
36e754250ff63d56cf2de5fbd07b2bec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteFile
CreateFileA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
GetOEMCP
HeapAlloc
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
HeapFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
RtlUnwind
user32
GetWindowThreadProcessId
GetDlgItem
MessageBoxA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowTextA
Exports
Exports
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
shared Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
cvery.comvc61544667824/exe/uiQQ盗.exe.exe windows:4 windows x86 arch:x86
c5e4176f4c36c9d71667002ae109528f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DialogBoxParamA
EndDialog
PostQuitMessage
GetWindowRect
GetSystemMetrics
SetWindowPos
IsWindow
FindWindowExA
KillTimer
MessageBoxA
SetTimer
1sass
?SetQQHook@@YGHPAUHWND__@@@Z
kernel32
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetStringTypeW
GetProcAddress
HeapReAlloc
VirtualAlloc
HeapAlloc
LoadLibraryA
GetEnvironmentStrings
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
cvery.comvc61544667824/exe/x.ico
-
cvery.comvc61544667824/下载说明.htm.html .js polyglot
-
cvery.comvc61544667824/说明文件.txt