Static task
static1
Behavioral task
behavioral1
Sample
Crossfire_Cheat.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Crossfire_Cheat.exe
Resource
win10v2004-20220901-en
General
-
Target
268fb73114b4584ba9cc9095d9ade42147a162973c172e68b31de6064e42e68a
-
Size
40KB
-
MD5
0ab65ccdf809d80bc476900e2f81873a
-
SHA1
c6d8215685bbd1e0a468e832fd39ef035665d023
-
SHA256
268fb73114b4584ba9cc9095d9ade42147a162973c172e68b31de6064e42e68a
-
SHA512
770d8c6e27f4c15f8faf6e00524db207ddfb25f80b9967b8f3c17c29b6774162e87ff319ccff8a6454d0a93cdf1acb9bd04dc6e5affe163c3287d68c254407bb
-
SSDEEP
768:4L5zjNarzJnkp9PQSQqR1I8tkSSf9LUVVCmZUVozc4qX6cAP8a4jiMzPNL7x2EUA:w5zRulePQSQYI8eJ4VVCIU+zxqXG6iM/
Malware Config
Signatures
Files
-
268fb73114b4584ba9cc9095d9ade42147a162973c172e68b31de6064e42e68a.rar
-
Crossfire_Cheat.exe.exe windows x86
8d1f3607f6f644aa45436b6badedcfb7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateProcessA
ExitProcess
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetModuleFileNameA
GetProcAddress
GetProcessHeap
HeapAlloc
HeapFree
IsBadReadPtr
LoadLibraryA
VirtualAllocEx
VirtualFree
VirtualProtect
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 20B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE