VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Dropper
Backdoor
Spyware
|
Threat Names: |
Quasar
Gen:Heur.Ransom.Imps.3
|
CardGame.exe
Windows Exe (x86-32)
Created at 2020-09-27T08:48:00
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4d3d9e |
Size Of Code | 0xd1e00 |
Size Of Initialized Data | 0x800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-09-26 16:58:27+00:00 |
Version Information (11)
»
Assembly Version | 3.5.0.0 |
Comments | - |
CompanyName | Tencent |
FileDescription | Gamebuddy |
FileVersion | 3.1.0.0 |
InternalName | CardGame.exe |
LegalCopyright | Copyright © Microsoft 2019 |
LegalTrademarks | - |
OriginalFilename | CardGame.exe |
ProductName | Gamebuddy |
ProductVersion | 3.1.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0xd1da4 | 0xd1e00 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 8.0 |
.rsrc | 0x4d4000 | 0x590 | 0x600 | 0xd2000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.99 |
.reloc | 0x4d6000 | 0xc | 0x200 | 0xd2600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0xd3d6c | 0xd1f6c | 0x0 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
cardgame.exe | 1 | 0x001E0000 | 0x002B7FFF | Relevant Image |
![]() |
32-bit | - |
![]() |
![]() |
...
|
cardgame.exe | 1 | 0x001E0000 | 0x002B7FFF | Process Termination |
![]() |
32-bit | - |
![]() |
![]() |
...
|
C:\Users\FD1HVy\AppData\Local\Temp\gpustats.bx | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Roaming\Microsoft\_CL_02f3a8c9sy | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Roaming\Microsoft\ctfmom.exe | Dropped File | Binary |
Unknown
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x40dc87 |
Size Of Code | 0x28400 |
Size Of Initialized Data | 0x13e00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-09-26 12:52:07+00:00 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x282d4 | 0x28400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.65 |
.rdata | 0x42a000 | 0xf384 | 0xf400 | 0x28800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.38 |
.data | 0x43a000 | 0x1f78 | 0x1200 | 0x37c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.22 |
.rsrc | 0x43c000 | 0x1e0 | 0x200 | 0x38e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.72 |
.reloc | 0x43d000 | 0x2618 | 0x2800 | 0x39000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.45 |
Imports (3)
»
KERNEL32.dll (89)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetModuleHandleW | 0x0 | 0x42a018 | 0x38a98 | 0x37298 | 0x278 |
GlobalUnlock | 0x0 | 0x42a01c | 0x38a9c | 0x3729c | 0x33f |
WriteConsoleW | 0x0 | 0x42a020 | 0x38aa0 | 0x372a0 | 0x611 |
HeapSize | 0x0 | 0x42a024 | 0x38aa4 | 0x372a4 | 0x34e |
GlobalLock | 0x0 | 0x42a028 | 0x38aa8 | 0x372a8 | 0x338 |
GetProcessHeap | 0x0 | 0x42a02c | 0x38aac | 0x372ac | 0x2b4 |
SetEnvironmentVariableW | 0x0 | 0x42a030 | 0x38ab0 | 0x372b0 | 0x514 |
FreeEnvironmentStringsW | 0x0 | 0x42a034 | 0x38ab4 | 0x372b4 | 0x1aa |
GetEnvironmentStringsW | 0x0 | 0x42a038 | 0x38ab8 | 0x372b8 | 0x237 |
GetCommandLineW | 0x0 | 0x42a03c | 0x38abc | 0x372bc | 0x1d7 |
GlobalAlloc | 0x0 | 0x42a040 | 0x38ac0 | 0x372c0 | 0x32d |
CopyFileA | 0x0 | 0x42a044 | 0x38ac4 | 0x372c4 | 0xa8 |
Sleep | 0x0 | 0x42a048 | 0x38ac8 | 0x372c8 | 0x57d |
MultiByteToWideChar | 0x0 | 0x42a04c | 0x38acc | 0x372cc | 0x3ef |
GetModuleFileNameA | 0x0 | 0x42a050 | 0x38ad0 | 0x372d0 | 0x273 |
GetLastError | 0x0 | 0x42a054 | 0x38ad4 | 0x372d4 | 0x261 |
WideCharToMultiByte | 0x0 | 0x42a058 | 0x38ad8 | 0x372d8 | 0x5fe |
EnterCriticalSection | 0x0 | 0x42a05c | 0x38adc | 0x372dc | 0x131 |
LeaveCriticalSection | 0x0 | 0x42a060 | 0x38ae0 | 0x372e0 | 0x3bd |
DeleteCriticalSection | 0x0 | 0x42a064 | 0x38ae4 | 0x372e4 | 0x110 |
SetLastError | 0x0 | 0x42a068 | 0x38ae8 | 0x372e8 | 0x532 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x42a06c | 0x38aec | 0x372ec | 0x35f |
SwitchToThread | 0x0 | 0x42a070 | 0x38af0 | 0x372f0 | 0x587 |
TlsAlloc | 0x0 | 0x42a074 | 0x38af4 | 0x372f4 | 0x59e |
TlsGetValue | 0x0 | 0x42a078 | 0x38af8 | 0x372f8 | 0x5a0 |
TlsSetValue | 0x0 | 0x42a07c | 0x38afc | 0x372fc | 0x5a1 |
TlsFree | 0x0 | 0x42a080 | 0x38b00 | 0x37300 | 0x59f |
GetSystemTimeAsFileTime | 0x0 | 0x42a084 | 0x38b04 | 0x37304 | 0x2e9 |
GetProcAddress | 0x0 | 0x42a088 | 0x38b08 | 0x37308 | 0x2ae |
EncodePointer | 0x0 | 0x42a08c | 0x38b0c | 0x3730c | 0x12d |
DecodePointer | 0x0 | 0x42a090 | 0x38b10 | 0x37310 | 0x109 |
GetCPInfo | 0x0 | 0x42a094 | 0x38b14 | 0x37314 | 0x1c1 |
CompareStringW | 0x0 | 0x42a098 | 0x38b18 | 0x37318 | 0x9b |
LCMapStringW | 0x0 | 0x42a09c | 0x38b1c | 0x3731c | 0x3b1 |
GetLocaleInfoW | 0x0 | 0x42a0a0 | 0x38b20 | 0x37320 | 0x265 |
GetStringTypeW | 0x0 | 0x42a0a4 | 0x38b24 | 0x37324 | 0x2d7 |
UnhandledExceptionFilter | 0x0 | 0x42a0a8 | 0x38b28 | 0x37328 | 0x5ad |
SetUnhandledExceptionFilter | 0x0 | 0x42a0ac | 0x38b2c | 0x3732c | 0x56d |
GetCurrentProcess | 0x0 | 0x42a0b0 | 0x38b30 | 0x37330 | 0x217 |
TerminateProcess | 0x0 | 0x42a0b4 | 0x38b34 | 0x37334 | 0x58c |
IsProcessorFeaturePresent | 0x0 | 0x42a0b8 | 0x38b38 | 0x37338 | 0x386 |
IsDebuggerPresent | 0x0 | 0x42a0bc | 0x38b3c | 0x3733c | 0x37f |
GetStartupInfoW | 0x0 | 0x42a0c0 | 0x38b40 | 0x37340 | 0x2d0 |
QueryPerformanceCounter | 0x0 | 0x42a0c4 | 0x38b44 | 0x37344 | 0x44d |
GetCurrentProcessId | 0x0 | 0x42a0c8 | 0x38b48 | 0x37348 | 0x218 |
GetCurrentThreadId | 0x0 | 0x42a0cc | 0x38b4c | 0x3734c | 0x21c |
InitializeSListHead | 0x0 | 0x42a0d0 | 0x38b50 | 0x37350 | 0x363 |
RtlUnwind | 0x0 | 0x42a0d4 | 0x38b54 | 0x37354 | 0x4d3 |
RaiseException | 0x0 | 0x42a0d8 | 0x38b58 | 0x37358 | 0x462 |
FreeLibrary | 0x0 | 0x42a0dc | 0x38b5c | 0x3735c | 0x1ab |
LoadLibraryExW | 0x0 | 0x42a0e0 | 0x38b60 | 0x37360 | 0x3c3 |
ExitProcess | 0x0 | 0x42a0e4 | 0x38b64 | 0x37364 | 0x15e |
GetModuleHandleExW | 0x0 | 0x42a0e8 | 0x38b68 | 0x37368 | 0x277 |
CreateFileW | 0x0 | 0x42a0ec | 0x38b6c | 0x3736c | 0xcb |
GetDriveTypeW | 0x0 | 0x42a0f0 | 0x38b70 | 0x37370 | 0x22f |
GetFileInformationByHandle | 0x0 | 0x42a0f4 | 0x38b74 | 0x37374 | 0x247 |
GetFileType | 0x0 | 0x42a0f8 | 0x38b78 | 0x37378 | 0x24e |
CloseHandle | 0x0 | 0x42a0fc | 0x38b7c | 0x3737c | 0x86 |
PeekNamedPipe | 0x0 | 0x42a100 | 0x38b80 | 0x37380 | 0x422 |
SystemTimeToTzSpecificLocalTime | 0x0 | 0x42a104 | 0x38b84 | 0x37384 | 0x589 |
FileTimeToSystemTime | 0x0 | 0x42a108 | 0x38b88 | 0x37388 | 0x16a |
GetModuleFileNameW | 0x0 | 0x42a10c | 0x38b8c | 0x3738c | 0x274 |
GetStdHandle | 0x0 | 0x42a110 | 0x38b90 | 0x37390 | 0x2d2 |
WriteFile | 0x0 | 0x42a114 | 0x38b94 | 0x37394 | 0x612 |
GetFileSizeEx | 0x0 | 0x42a118 | 0x38b98 | 0x37398 | 0x24c |
SetFilePointerEx | 0x0 | 0x42a11c | 0x38b9c | 0x3739c | 0x523 |
HeapAlloc | 0x0 | 0x42a120 | 0x38ba0 | 0x373a0 | 0x345 |
FlushFileBuffers | 0x0 | 0x42a124 | 0x38ba4 | 0x373a4 | 0x19f |
GetConsoleCP | 0x0 | 0x42a128 | 0x38ba8 | 0x373a8 | 0x1ea |
GetConsoleMode | 0x0 | 0x42a12c | 0x38bac | 0x373ac | 0x1fc |
HeapFree | 0x0 | 0x42a130 | 0x38bb0 | 0x373b0 | 0x349 |
HeapReAlloc | 0x0 | 0x42a134 | 0x38bb4 | 0x373b4 | 0x34c |
GetCurrentDirectoryW | 0x0 | 0x42a138 | 0x38bb8 | 0x373b8 | 0x211 |
GetFullPathNameW | 0x0 | 0x42a13c | 0x38bbc | 0x373bc | 0x259 |
IsValidLocale | 0x0 | 0x42a140 | 0x38bc0 | 0x373c0 | 0x38d |
GetUserDefaultLCID | 0x0 | 0x42a144 | 0x38bc4 | 0x373c4 | 0x312 |
EnumSystemLocalesW | 0x0 | 0x42a148 | 0x38bc8 | 0x373c8 | 0x154 |
SetStdHandle | 0x0 | 0x42a14c | 0x38bcc | 0x373cc | 0x54a |
ReadFile | 0x0 | 0x42a150 | 0x38bd0 | 0x373d0 | 0x473 |
ReadConsoleW | 0x0 | 0x42a154 | 0x38bd4 | 0x373d4 | 0x470 |
GetTimeZoneInformation | 0x0 | 0x42a158 | 0x38bd8 | 0x373d8 | 0x30e |
FindClose | 0x0 | 0x42a15c | 0x38bdc | 0x373dc | 0x175 |
FindFirstFileExW | 0x0 | 0x42a160 | 0x38be0 | 0x373e0 | 0x17b |
FindNextFileW | 0x0 | 0x42a164 | 0x38be4 | 0x373e4 | 0x18c |
IsValidCodePage | 0x0 | 0x42a168 | 0x38be8 | 0x373e8 | 0x38b |
GetACP | 0x0 | 0x42a16c | 0x38bec | 0x373ec | 0x1b2 |
GetOEMCP | 0x0 | 0x42a170 | 0x38bf0 | 0x373f0 | 0x297 |
GetCommandLineA | 0x0 | 0x42a174 | 0x38bf4 | 0x373f4 | 0x1d6 |
SetEndOfFile | 0x0 | 0x42a178 | 0x38bf8 | 0x373f8 | 0x510 |
USER32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
EmptyClipboard | 0x0 | 0x42a180 | 0x38c00 | 0x37400 | 0xe8 |
GetClipboardData | 0x0 | 0x42a184 | 0x38c04 | 0x37404 | 0x134 |
SetClipboardData | 0x0 | 0x42a188 | 0x38c08 | 0x37408 | 0x31b |
IsClipboardFormatAvailable | 0x0 | 0x42a18c | 0x38c0c | 0x3740c | 0x228 |
CloseClipboard | 0x0 | 0x42a190 | 0x38c10 | 0x37410 | 0x4f |
OpenClipboard | 0x0 | 0x42a194 | 0x38c14 | 0x37414 | 0x297 |
ADVAPI32.dll (5)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegOpenKeyA | 0x0 | 0x42a000 | 0x38a80 | 0x37280 | 0x28a |
RegQueryValueExA | 0x0 | 0x42a004 | 0x38a84 | 0x37284 | 0x298 |
RegSetValueExA | 0x0 | 0x42a008 | 0x38a88 | 0x37288 | 0x2a8 |
RegOpenKeyExA | 0x0 | 0x42a00c | 0x38a8c | 0x3728c | 0x28b |
RegCloseKey | 0x0 | 0x42a010 | 0x38a90 | 0x37290 | 0x25b |
Memory Dumps (3)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
ctfmom.exe | 13 | 0x00CB0000 | 0x00CEFFFF | Relevant Image |
![]() |
32-bit | 0x00CC07EA |
![]() |
![]() |
...
|
ctfmom.exe | 13 | 0x00CB0000 | 0x00CEFFFF | Process Termination |
![]() |
32-bit | - |
![]() |
![]() |
...
|
ctfmom.exe | 13 | 0x00CB0000 | 0x00CEFFFF | Final Dump |
![]() |
32-bit | - |
![]() |
![]() |
...
|
C:\Users\FD1HVy\AppData\Local\Temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\Dirs\Desktop.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\Dirs\Documents.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\Dirs\Pictures.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\Dirs\Videos.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\Dirs\Startup.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\Dirs\Downloads.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\Dirs\OneDrive.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\Dirs\Temp.txt | Dropped File | Text |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\local\temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\screen.jpeg | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\tempDataBase2020-09-27T10_51_13.8143122+02_0088 | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\Cookies.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\Others.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\3574ab5307973278a085288fd98393ab\a374bfdbdd1bc28c24c1762625e80fd0\processes.txt | Dropped File | Text |
Unknown
|
...
|
»