NvOptimusEnablement
Static task
static1
Behavioral task
behavioral1
Sample
BeamNG.drive.exe
Resource
win10-20230621-en
General
-
Target
BeamNG.drive.exe
-
Size
1.4MB
-
MD5
06866d266d49e8546ef3e288bf1c6497
-
SHA1
a89741e0898340a0e5ab12225a29bfa7ea59b64e
-
SHA256
bfe3fa2a425c58e883de0326ff7dca093f11dab028274c53ae8ab3b6c269d5af
-
SHA512
82e863e88b3f47f8c39e4189c592e1251ee711674dba5ed83d563dfe3be6a02f5f84bd5a3b7f17fbfbfc7a6943cf81f84f570ab34ca56c081b3a4d153a6289ce
-
SSDEEP
24576:nd6+iHVR+SrEON9Fvt0EQIKMnv6J3GWFyK6olQVCHGqyVMKqs+6Ikknkkm:fSVg5N00G/K66GqGDqn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource BeamNG.drive.exe
Files
-
BeamNG.drive.exe.exe windows x86
af796c5c46dcf9c6c2479d991df144b5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
ntohs
getsockopt
getsockname
getpeername
connect
send
recv
WSASetLastError
select
__WSAFDIsSet
WSAGetLastError
WSACleanup
WSAStartup
setsockopt
sendto
htons
closesocket
getaddrinfo
freeaddrinfo
listen
recvfrom
ioctlsocket
gethostname
htonl
ntohl
socket
WSAIoctl
accept
bind
advapi32
RegSetKeyValueW
RegGetValueW
OpenProcessToken
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
RegSetValueExA
RegCreateKeyExA
RegSetValueExW
RegOpenKeyExA
RegDeleteValueW
crypt32
CertCreateCertificateChainEngine
CertCloseStore
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertOpenStore
CryptQueryObject
CertGetNameStringA
CertAddCertificateContextToStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
shlwapi
PathFileExistsW
PathIsDirectoryEmptyW
kernel32
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExA
FindNextFileA
GetDateFormatW
GetConsoleCP
ReadConsoleW
GetConsoleMode
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetStdHandle
MoveFileExW
SetFileTime
SetEnvironmentVariableA
ExitThread
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
CloseHandle
WaitForSingleObject
CreateProcessW
GetCommandLineA
GetCommandLineW
SetUnhandledExceptionFilter
SetErrorMode
LocalFree
GetModuleHandleW
VerSetConditionMask
GetStdHandle
CreateFileW
WriteFile
DuplicateHandle
GetLastError
WaitNamedPipeW
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
IsValidCodePage
GlobalMemoryStatusEx
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
FreeLibrary
GetModuleFileNameW
TzSpecificLocalTimeToSystemTime
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LoadLibraryW
VerifyVersionInfoW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
Sleep
SleepEx
GetTickCount64
WaitForSingleObjectEx
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
VerifyVersionInfoA
ExpandEnvironmentStringsA
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
SetLastError
FormatMessageA
CreateFileA
GetFileSizeEx
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
LocalAlloc
GetSystemDirectoryW
LoadLibraryExW
OutputDebugStringW
lstrcmpW
ExpandEnvironmentStringsW
GetFullPathNameW
GetDriveTypeW
GetModuleHandleExW
ExitProcess
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
SystemTimeToFileTime
GetModuleFileNameA
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetProcAddress
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
OpenProcess
GetSystemInfo
GetVersionExW
FreeConsole
SetConsoleTitleW
AllocConsole
WriteConsoleW
RemoveDirectoryW
CopyFileW
MoveFileW
DecodePointer
RaiseException
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
CancelIo
WaitForMultipleObjectsEx
ReadDirectoryChangesW
DeleteFileW
FindFirstFileExW
FlushFileBuffers
GetFileAttributesExW
SetFilePointer
CreateThread
GetCurrentThreadId
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetTimeZoneInformation
QueryPerformanceCounter
QueryPerformanceFrequency
GetDiskFreeSpaceExW
SetEndOfFile
SetFilePointerEx
GetTempPathW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThread
GetExitCodeThread
TryEnterCriticalSection
GetStringTypeW
GetCPInfo
EncodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
CompareStringW
LCMapStringW
GetLocaleInfoW
SetEvent
ResetEvent
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
user32
EmptyClipboard
SetClipboardData
CloseClipboard
LoadIconW
SendMessageW
MessageBoxW
MessageBoxA
OpenClipboard
PostMessageW
GetSystemMetrics
shell32
ShellExecuteA
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
SHGetKnownFolderPath
ole32
CoInitialize
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitializeEx
winmm
timeGetTime
comctl32
ord345
powrprof
PowerGetActiveScheme
PowerSetActiveScheme
oleaut32
SysFreeString
SysAllocString
Exports
Exports
Sections
.text Size: 904KB - Virtual size: 904KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 226KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 276KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ