Static task
static1
General
-
Target
MineInAbyss_Launcher-windows-1.4.1.exe
-
Size
90.5MB
-
MD5
c1050c015210a1c92caa65865a6dbada
-
SHA1
3e1fcb99dba320ca18b01242a16e7fb073105be7
-
SHA256
25c3394d06f894b8d3bbb9fae033ce15c8c3eea0789703b328143e1df6f572af
-
SHA512
200a02eed7e4eee73960543f09c541451a5ca0472db2d406da563c2db82f39e5efa3f2c30f8152a0c40ba6d399d9d0a9ae6006a5e4bd8b06ddcb879d40bbee9c
-
SSDEEP
1572864:j1yULMbKXirEQvsny31SOsO2laZJzLLRkTS6z6lqQRI0SGAc/r+tXrl:j15LM+yNMyAOV2la/zRkTSi6YxzEU
Malware Config
Signatures
Files
-
MineInAbyss_Launcher-windows-1.4.1.exe.exe windows x64
864058cc98d8e0b4a84222f4218de7c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shlwapi
PathIsDirectoryEmptyW
shell32
CommandLineToArgvW
kernel32
LCMapStringW
SetEndOfFile
WriteConsoleW
HeapSize
CloseHandle
GetLastError
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetProcessId
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
LoadResource
LockResource
SizeofResource
FindResourceW
FreeLibrary
GetModuleHandleExW
GetProcAddress
LoadLibraryW
LocalFree
FormatMessageW
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
RemoveDirectoryW
SetFileAttributesW
SetLastError
GetTickCount
CopyFileW
MoveFileExW
GetCommandLineW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetTempPathW
GetSystemDirectoryW
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
RtlUnwind
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetProcessHeap
RtlPcToFileHeader
RaiseException
RtlUnwindEx
LoadLibraryExW
GetFullPathNameW
GetDriveTypeW
GetStdHandle
WriteFile
ExitProcess
HeapAlloc
HeapFree
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
GetCurrentDirectoryW
HeapReAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
Sections
.text Size: 330KB - Virtual size: 329KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 90.0MB - Virtual size: 90.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ