PUP.GameHack.J

Analysis Report

General information

Family Name: PUP.GameHack.J
Packers: UPX
Signature status: No Signature

Known Samples

MD5: a205947ff2ae0b0d56bda66efa1abe3f
SHA1: f5bc819b7827ac92b4ff2d8256b9784cf1b7c059
SHA256: C1356726002E02C276957AF9F4F3E6F01ACCC7847416A3A858C58B4E1BF0C52D
File Size: 4.37 MB, 4374278 bytes
MD5: 9c0006f3bae04c79af21aea624f68c52
SHA1: c1a6ba9eb374431f8a5c3df7474f6b1b7a989f38
SHA256: 98489C0CA1C0E2AB2501CC015AF88B7CCA3463D5FEDB6859ED07A98061B5E121
File Size: 248.32 KB, 248320 bytes
MD5: 64aa21b27e88cf917c5591ed956370a1
SHA1: ee896b766b8cad6f027a9d6d44f4030ff1b7feda
SHA256: 0EF220745585004E4C6C79890243A9C47D33EF0934A147830CAC865DE8D93DCE
File Size: 66.05 KB, 66048 bytes
MD5: bc210a055b454096a997e93d854fd330
SHA1: bcee60dc3ce46ecaa20f35f526be35bb8c8dfae3
SHA256: 56321DD25C2EAC2607D9A07019B7B52FC9260645409D08BEB5026C03D602670D
File Size: 117.25 KB, 117248 bytes
MD5: f712c17ed1634feae7a9c95e6372e9ca
SHA1: 11e1389aa27445500804f2f8b74759c7f700847a
SHA256: 5ECD1D74B750F01F0BB36AED9906F79E09C13A7CF1FA1F3F663D7207AF7261EE
File Size: 8.48 MB, 8483305 bytes
Show More
MD5: 246e4b6026edd422396b10be7ead225f
SHA1: 417472422fae3f34d3eb12fd467e9d28bceec409
SHA256: 3F4F802F42A48331848982685FB2061B38ACABC01F089AE76F12EAFF5DE156A5
File Size: 54.27 KB, 54272 bytes
MD5: 3041dcf8c9f6e1662b04127f9180f84c
SHA1: 9ebd36a40fb73f1d4f76a952749369c32a5907b4
SHA256: 962DC3CC9E1515D058F0C25E2EFDFB387D1E588EBA825A3D32CBA51A8D8B9827
File Size: 925.18 KB, 925184 bytes
MD5: 7feface2420ef57b2637b7383080bded
SHA1: c6595266bf9699916354118a6fb09e15fafa10f5
SHA256: 533CD9368863075545BAF80EF58AED93EAEE7BD494D6C7BB715DEA261AA259E0
File Size: 711.44 KB, 711438 bytes
MD5: 74536a4938a452d5349cdef07b747630
SHA1: 74e8f264fab46947787eaf5b13dea219d64b2236
SHA256: 8497931F116720A90A639F2C5F950B27DE971A50B01997ACE0402EADAFB96954
File Size: 137.73 KB, 137729 bytes
MD5: 39fb04078b8e4e55d29c18a9ccbb8663
SHA1: 8cd8de22915986ec025ead882c6c481aee2e6d72
SHA256: 874E706BF308E31BB508E50E8B3A28DF6ABCBEFC3DAD1E9476F4342F3B327929
File Size: 98.30 KB, 98304 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has been packed
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is 64-bit executable
Show More
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments
  • (2x)
  • HcH of TechKnow (2022)
Company Name
  • FiGHTiNG FoR FuN
  • TechKnow
  • Tukero[X]Team
File Description
  • Database Viewer
  • elooo's KeyGen
  • Keygen Application
File Version
  • 1.00
  • 1, 0, 0, 8
  • 1, 0, 0, 1
Internal Name
  • Keygen
  • pc_xxxxx.zip
  • s2k21
  • TJprojMain
Legal Copyright
  • Copyright (C) 2009
  • Copyright © 2004 elooo [FFF]
  • TechKnow 2022
Original Filename
  • Keygen.EXE
  • s2k22.exe
  • TJprojMain.exe
Product Name
  • KeyGen
  • Keygen Application
  • Project1
  • Serials 2022
Product Version
  • 1.00
  • 1, 0, 0, 8
  • 1, 0, 0, 1

File Traits

  • .UPX
  • 2+ executable sections
  • dll
  • HighEntropy
  • MPRESS
  • MPRESS Win32
  • Native MPRESS x86
  • No Version Info
  • packed
  • PEC2
Show More
  • PECompact v2.20
  • UPX!
  • x86

Block Information

Total Blocks: 554
Potentially Malicious Blocks: 7
Whitelisted Blocks: 542
Unknown Blocks: 5

Visual Map

0 0 0 0 0 0 ? x ? x x x x 0 x x ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • AutoHotkey.A
  • Bitcoinminer.R
  • Brute.PVE
  • Injector.KZP
  • Injector.XN
Show More
  • Keygen.M
  • MPRESS Packer
  • PWS.Onlinegames.AS
  • Strictor.A
  • Trojan.Agent.Gen.ZW
  • Webalta.A

Files Modified

File Attributes
c:\users\user\appdata\local\temp\ms276b9e\bass.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ms276b9e\generell.ini Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ms276b9e\main.jpg Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ms276b9e\mainskin.ini Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ms276b9e\menu_back.jpg Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ms276b9e\menu_mask.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ms276b9e\rzrcbm5.xm Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ms276b9e\xcrazor.dll Generic Write,Read Attributes
c:\users\user\downloads\s2k22.cdkey.db Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateThreadEx
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtFreeVirtualMemory
Show More
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWriteFile
  • UNKNOWN
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Other Suspicious
  • SetWindowsHookEx
Keyboard Access
  • GetKeyState

Related Posts

Trending

Most Viewed

Loading...