Static task
static1
Behavioral task
behavioral1
Sample
Pixel Strike Menu_[unknowncheats.me]_.dll
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
Pixel Strike Menu_[unknowncheats.me]_.dll
Resource
win10v2004-20230220-es
General
-
Target
Pixel Strike Menu_[unknowncheats.me]_.dll
-
Size
316KB
-
MD5
867e0bae2370d4016a6b3b538ea23fe1
-
SHA1
1e202a472f74404590181f0161ec298929cc97e6
-
SHA256
78c568183bad2373a9b47068c0487d90586ce8e1d63efb72c59f3c77fa67a744
-
SHA512
cdd639b4b897771c7ddb8bbd9a49b07f6bd06901c835de7fb9f309f2d82fb9576d541040abd5388d6bc1be0aaf7ae7079f53f81110a03e45f86a62ea1023c024
-
SSDEEP
6144:kmTFQOku3XVAABDdu25cV204oq1de8/V6R1aF0slqrRD/nxKLHPSHRLDSLUrcCO0:56R1K0ITlQalnn
Malware Config
Signatures
Files
-
Pixel Strike Menu_[unknowncheats.me]_.dll.dll windows x64
Password: 112233
823d47982192a9503a3c2bc343479314
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateToolhelp32Snapshot
Process32Next
CloseHandle
ReadProcessMemory
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleHandleA
GetProcAddress
VirtualFree
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapCreate
HeapFree
GetCurrentProcess
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
Sleep
HeapReAlloc
HeapAlloc
GetCurrentProcessId
GetModuleHandleW
FlushInstructionCache
SetThreadContext
OpenThread
OpenProcess
DisableThreadLibraryCalls
CreateThread
AllocConsole
Process32First
InitializeSListHead
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
VirtualProtect
GetThreadContext
WriteProcessMemory
user32
GetAsyncKeyState
RegisterClassExA
CallWindowProcA
SetWindowLongPtrA
DestroyWindow
DefWindowProcA
CreateWindowExA
UnregisterClassA
GetClientRect
SetCapture
ReleaseCapture
GetForegroundWindow
SetCursorPos
IsChild
GetCursorPos
OpenClipboard
CloseClipboard
ClientToScreen
EmptyClipboard
GetClipboardData
SetClipboardData
GetCapture
ScreenToClient
LoadCursorA
GetKeyState
SetCursor
msvcp140
?uncaught_exceptions@std@@YAHXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Xlength_error@std@@YAXPEBD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@M@Z
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
d3dcompiler_43
D3DCompile
xinput1_3
ord4
ord2
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
strstr
__std_type_info_destroy_list
_CxxThrowException
memmove
memcpy
memcmp
memchr
memset
__C_specific_handler
__current_exception_context
__current_exception
__std_exception_copy
__std_exception_destroy
api-ms-win-crt-runtime-l1-1-0
_wassert
_invalid_parameter_noinfo_noreturn
terminate
_seh_filter_dll
_initterm_e
_initterm
_cexit
_crt_atexit
_execute_onexit_table
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
api-ms-win-crt-convert-l1-1-0
mbstowcs
api-ms-win-crt-string-l1-1-0
strcmp
_wcsicmp
strncpy
api-ms-win-crt-stdio-l1-1-0
freopen_s
ftell
__acrt_iob_func
__stdio_common_vsscanf
fread
__stdio_common_vsprintf
_wfopen
fwrite
fseek
fflush
fclose
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-heap-l1-1-0
calloc
malloc
free
_callnewh
api-ms-win-crt-math-l1-1-0
ceilf
floorf
cosf
sinf
sqrtf
fmodf
Sections
.text Size: 235KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 188B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ