c:\cpuid\applications\cpu_z\cpu_z_en\release\cpuz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cpuzchs.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cpuzchs.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
d629fb77b8d1b9458910f2a42e87ef34_JaffaCakes118
-
Size
570KB
-
MD5
d629fb77b8d1b9458910f2a42e87ef34
-
SHA1
5f33fb722fa0563e095854bee4b9d5e73839e191
-
SHA256
4b65daf93ea2101103172dd513d97220c061017476edba4bff593e812d516f5b
-
SHA512
0b6318443ab172902e8f87dc7cd67984e3d3c6ecbff9b0e5892daa9c54e507d0d96f3e226af23e703e92692c8dedf48c1c43f18f59d6102f03fbb9a3fda2361d
-
SSDEEP
12288:MFhNS0oPI7mo+s6t06mVU/qcu/8f3Z8Mw1oJAHoJAHfCh4HZIUMOs6:Wk0hb+0aidExvweAIofCh8IYs6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/cpuzchs.exe
Files
-
d629fb77b8d1b9458910f2a42e87ef34_JaffaCakes118.rar
-
cpuzchs.exe.exe windows:4 windows x86 arch:x86
e54fa2bf93cfd235a8023fc238284c5e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
SetEndOfFile
CreateFileW
SetErrorMode
HeapAlloc
GetStartupInfoW
RaiseException
RtlUnwind
HeapReAlloc
ExitProcess
HeapSize
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
LCMapStringA
LCMapStringW
SetStdHandle
GetConsoleOutputCP
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
WritePrivateProfileStringW
GetThreadLocale
lstrlenA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GlobalFlags
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
InterlockedExchange
FormatMessageW
GetVersionExW
FreeResource
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
lstrcmpW
GlobalLock
GlobalUnlock
MulDiv
lstrcmpiA
GetSystemDirectoryA
GetModuleHandleA
FindResourceA
GetWindowsDirectoryA
RemoveDirectoryA
GetComputerNameA
GetCurrentDirectoryA
GetModuleFileNameA
CreateDirectoryA
GetLocalTime
DeleteFileA
SetCurrentDirectoryA
GetTempPathA
GetCurrentProcessId
CreateEventA
GetOverlappedResult
ReadFile
WriteFile
QueryPerformanceCounter
QueryPerformanceFrequency
GetTickCount
LocalAlloc
CreateFileA
DeviceIoControl
LocalFree
GetSystemInfo
GetProcessAffinityMask
GetCurrentThread
GetCurrentProcess
SetFilePointer
GetVersionExA
LoadLibraryA
CreateMutexA
SetLastError
ReleaseMutex
WriteConsoleA
GetLastError
GetProcessHeap
HeapFree
FreeLibrary
LoadLibraryW
GlobalMemoryStatus
GetSystemTime
GetTempPathW
WinExec
lstrlenW
lstrcatW
lstrcpyW
WriteConsoleW
ExitThread
Sleep
SetThreadPriority
CreateThread
GetStdHandle
GetProcAddress
InterlockedDecrement
MultiByteToWideChar
CloseHandle
WaitForSingleObject
WideCharToMultiByte
GetModuleFileNameW
GetModuleHandleW
GlobalSize
GlobalReAlloc
GlobalAlloc
GlobalFree
SetCurrentDirectoryW
FindResourceW
LoadResource
LockResource
SizeofResource
GetComputerNameW
GetCurrentDirectoryW
GetCommandLineW
user32
UnregisterClassW
LoadCursorW
GetSysColorBrush
DestroyMenu
PostQuitMessage
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetMenuState
EnableMenuItem
CheckMenuItem
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
SetDlgItemInt
GetDesktopWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
ShowWindow
GetMessageW
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
IsWindowEnabled
LoadIconW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
UnregisterClassA
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
IsWindow
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
TrackPopupMenu
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenu
PostMessageW
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
EndPaint
BeginPaint
ScreenToClient
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
wsprintfA
ClientToScreen
ModifyMenuW
AppendMenuW
SetFocus
CreatePopupMenu
CreateCursor
SetWindowLongW
SetCursor
DestroyCursor
UpdateWindow
InvalidateRect
IsIconic
SetTimer
KillTimer
DestroyIcon
LoadImageW
OffsetRect
GetSysColor
DrawIcon
GetSystemMetrics
MessageBoxW
wsprintfW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
ReleaseDC
GetClientRect
GetDC
GetWindowDC
GetWindowRect
SendMessageW
LoadBitmapW
RegisterWindowMessageW
EnableWindow
MapWindowPoints
DestroyWindow
CallNextHookEx
gdi32
DeleteObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetObjectW
GetStockObject
CreatePalette
GetSystemPaletteEntries
GetDeviceCaps
CreateCompatibleDC
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateSolidBrush
GetTextExtentPoint32W
CreateFontIndirectW
GetPixel
CreateBitmap
CreateFontW
GetDIBits
BitBlt
CreateCompatibleBitmap
RealizePalette
SelectPalette
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegSetValueExW
RegCreateKeyExW
RegEnumKeyW
RegDeleteKeyW
RegQueryValueExW
RegOpenKeyW
ImpersonateSelf
OpenThreadToken
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerA
ControlService
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
CloseServiceHandle
OpenProcessToken
RegCloseKey
RegQueryValueW
RegOpenKeyExW
shell32
ShellExecuteW
shlwapi
PathFindFileNameW
PathFindExtensionW
ole32
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitialize
CoInitializeSecurity
oleaut32
SafeArrayGetElemsize
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysFreeString
VariantChangeType
VariantClear
VariantInit
SysStringLen
SafeArrayGetElement
SafeArrayGetVartype
Sections
.text Size: 820KB - Virtual size: 817KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 184KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 636KB - Virtual size: 633KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
新云软件.url.url