Static task
static1
General
-
Target
v2game.exe
-
Size
8.5MB
-
MD5
2278bc4d8ee548bf16ba181c5bd927c3
-
SHA1
583243c4cc2fcc2de4d589c4d2ee037997f81571
-
SHA256
43987575a0e6384c7847b548de88aede204e10c7d1949fd2e886b548e4c27814
-
SHA512
1597403699f94c9b0cb6854e7ff74e32a84a8d0ed9a278d070f02d0d54910001b64c8d5ec7528e0f9e406fd445c8835270c31c132ec957c8dc28f66a6518c24a
-
SSDEEP
196608:bfRFZE6eN74htvHNMbycOrymk3+5rwTqFjlT/pz0s1WJaLa/8ga59nAwlieC8Mjo:bJFZE6eN72NtMXOryb3+5rwTqFjlT/j7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource v2game.exe
Files
-
v2game.exe.exe windows x86
2a0a4dd1d11ea64322f8c2c45dd81ff8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
d3dx9_41
D3DXPlaneIntersectLine
D3DXIntersectTri
D3DXMatrixTranspose
D3DXLoadMeshFromXA
D3DXComputeBoundingSphere
D3DXGetFVFVertexSize
D3DXComputeBoundingBox
D3DXLoadMeshHierarchyFromXA
D3DXFrameDestroy
D3DXFrameCalculateBoundingSphere
D3DXFrameFind
D3DXBoxBoundProbe
D3DXCreateSprite
D3DXMatrixRotationYawPitchRoll
D3DXCreateEffectFromFileA
D3DXCreateEffectPool
D3DXMatrixScaling
D3DXCreateVolumeTextureFromFileExA
D3DXMatrixRotationZ
D3DXVec3CatmullRom
D3DXIntersect
D3DXMatrixRotationY
D3DXVec3TransformNormal
D3DXVec3TransformCoord
D3DXMatrixLookAtLH
D3DXMatrixOrthoRH
D3DXCreateTextureFromFileExA
D3DXCreateTexture
D3DXCreateRenderToSurface
D3DXLoadSurfaceFromSurface
D3DXSaveTextureToFileA
D3DXCreateTextureFromFileA
D3DXMatrixOrthoLH
D3DXVec2CatmullRom
D3DXVec2Normalize
D3DXVec3Normalize
D3DXFloat16To32Array
D3DXFloat32To16Array
D3DXMatrixOrthoOffCenterLH
D3DXCreateLine
D3DXCreateFontIndirectA
D3DXMatrixTranslation
D3DXMatrixMultiply
D3DXSaveSurfaceToFileA
D3DXMatrixInverse
D3DXVec3Unproject
D3DXPlaneFromPoints
D3DXMatrixPerspectiveFovLH
lua51
luaL_loadfile
luaL_loadstring
lua_isstring
lua_getfield
luaL_newstate
luaL_openlibs
lua_equal
lua_pushthread
lua_next
lua_pcall
lua_setfield
lua_insert
lua_getfenv
lua_getmetatable
lua_replace
lua_tocfunction
lua_getupvalue
lua_pushfstring
lua_call
lua_setfenv
lua_pushlightuserdata
lua_createtable
lua_rawset
lua_setmetatable
luaL_ref
lua_rawgeti
lua_pushvalue
luaL_unref
lua_type
lua_concat
lua_error
lua_settable
lua_newuserdata
lua_pushcclosure
lua_isnumber
lua_pushnumber
lua_toboolean
lua_pushboolean
lua_pushnil
lua_pushlstring
lua_rawget
lua_touserdata
lua_pushinteger
lua_objlen
lua_tolstring
lua_gettop
lua_gettable
lua_remove
lua_settop
lua_pushstring
lua_tonumber
lua_tointeger
kernel32
GetACP
UnhandledExceptionFilter
HeapSize
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsProcessorFeaturePresent
LCMapStringW
GetCPInfo
MoveFileA
ExitProcess
GetModuleHandleW
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
HeapAlloc
FindFirstFileExA
FindClose
GetConsoleMode
GetConsoleCP
GetFileType
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
HeapFree
RtlUnwind
RaiseException
DecodePointer
EncodePointer
InterlockedExchange
InterlockedCompareExchange
GetStringTypeW
WideCharToMultiByte
TryEnterCriticalSection
FormatMessageA
TerminateProcess
CreateThread
GetExitCodeThread
SetThreadPriority
WaitForSingleObject
ExitThread
GetDriveTypeA
GetDiskFreeSpaceExA
IsDebuggerPresent
GetSystemTime
GetCurrentThreadId
GetOEMCP
DeleteFileA
WriteFile
SetFileTime
FatalExit
Sleep
FreeLibrary
GetProcAddress
LoadLibraryA
CreateDirectoryA
GetExitCodeProcess
CreateProcessA
GetCommandLineA
HeapCreate
LocalFileTimeToFileTime
SystemTimeToFileTime
ReadFile
CreateFileA
SetFilePointer
InterlockedIncrement
GetCurrentDirectoryA
GetModuleFileNameA
GetCurrentProcessId
SetLastError
CopyFileA
FindNextFileA
CloseHandle
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedDecrement
SetUnhandledExceptionFilter
InitializeCriticalSection
GetLastError
GetFileAttributesA
MultiByteToWideChar
GetModuleHandleA
GetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
GetCurrentProcess
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
QueryPerformanceFrequency
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
SetFileAttributesA
IsValidCodePage
SetStdHandle
SetHandleCount
CreateFileW
WriteConsoleW
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
LoadLibraryW
GetTimeZoneInformation
GetFullPathNameA
GetCurrentDirectoryW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetEndOfFile
GetProcessHeap
GetDriveTypeW
CompareStringW
SetEnvironmentVariableA
TerminateThread
OutputDebugStringA
user32
MoveWindow
AdjustWindowRect
CharLowerBuffA
CharUpperBuffA
GetMessageA
LoadCursorFromFileA
LoadCursorA
GetWindowRect
GetCursorPos
SetCursor
GetAsyncKeyState
wsprintfA
ShowWindow
FindWindowExA
DestroyWindow
UnregisterClassA
RegisterClassExA
GetDesktopWindow
CreateWindowExA
DefWindowProcA
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
GetKeyState
GetSystemMetrics
SetRect
MessageBoxA
ShowCursor
SendMessageA
LoadIconA
GetForegroundWindow
PostQuitMessage
shell32
ShellExecuteA
zlib1
gzopen
gzread
gzclose
gzwrite
psapi
GetProcessMemoryInfo
d3d9
Direct3DCreate9
dsound
ord11
ws2_32
accept
ntohl
WSARecvFrom
ntohs
setsockopt
WSAStartup
WSACleanup
connect
WSASendTo
getsockopt
htons
htonl
bind
listen
ioctlsocket
select
WSAGetLastError
__WSAFDIsSet
send
recv
inet_addr
inet_ntoa
gethostname
closesocket
gethostbyname
socket
dinput8
DirectInput8Create
winmm
timeEndPeriod
timeBeginPeriod
timeGetTime
ole32
CoUninitialize
CoInitializeEx
StringFromGUID2
CoCreateInstance
Sections
.text Size: 6.6MB - Virtual size: 6.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 205KB - Virtual size: 4.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 513KB - Virtual size: 512KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ