__EnableScrollBar@12
Static task
static1
Behavioral task
behavioral1
Sample
Battlefield.Bad.Company2.1.0.1.crack.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Battlefield.Bad.Company2.1.0.1.crack.exe
Resource
win10v2004-20231215-en
General
-
Target
1d6ba164de48bf448f3254638eb8a974
-
Size
134KB
-
MD5
1d6ba164de48bf448f3254638eb8a974
-
SHA1
08c16c36679a8a9861a8eac1341987128c93c1d6
-
SHA256
24e6d1ffdfdd53bb68e4d6b5c941724e8413f942189c27a3959f82ae8a93c541
-
SHA512
42331a9bfbf53e050cd2e05067ab6b1644f43055b26fc943260e14b8f2990ec0633413840c6a97f50e68eb2c6ca0d63719807f0a7e66cd0ebce8c2a1d877276f
-
SSDEEP
3072:b7uSCM6nS6zHlZv1NdAkt1I3cH68Ys6o4UCasFRl89VjWfr:b79x6nS6h0kfG8Kl49Vj0r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Battlefield.Bad.Company2.1.0.1.crack.exe
Files
-
1d6ba164de48bf448f3254638eb8a974.zip
-
ACME.nfo
-
Battlefield.Bad.Company2.1.0.1.crack.exe.exe windows:5 windows x86 arch:x86
09d2d3ca61fee27b719240884d863c9e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
wcsncmp
_vsnwprintf
shlwapi
StrCpyW
PathStripToRootW
PathCanonicalizeA
StrFormatByteSizeW
StrFormatKBSizeW
shell32
ord750
kernel32
TlsGetValue
SetCommBreak
SetFileTime
SetHandleCount
SetupComm
BindIoCompletionCallback
DeleteTimerQueue
CreateEventW
GetProfileStringA
CancelIo
RequestDeviceWakeup
OpenEventW
SetVolumeLabelA
FileTimeToDosDateTime
SetProcessWorkingSetSize
CreateDirectoryA
LoadLibraryW
SleepEx
CreateMutexA
lstrcmpiW
GetLogicalDriveStringsA
DisconnectNamedPipe
FatalAppExitW
user32
RealGetWindowClassW
DestroyAcceleratorTable
InvertRect
EnumPropsW
LookupIconIdFromDirectory
GetDlgItemTextA
DlgDirListW
GetMenuInfo
SetMenu
GetLastInputInfo
GetCursorPos
ScrollWindow
GetDCEx
TileWindows
IntersectRect
GetDC
EnumWindows
LoadBitmapA
CopyImage
DialogBoxIndirectParamW
KillTimer
IsCharUpperA
LoadMenuIndirectA
GetRawInputData
GetClientRect
ExitWindowsEx
TranslateMessage
EnumPropsA
PeekMessageW
GetListBoxInfo
GetTabbedTextExtentA
GetMenuContextHelpId
ShowScrollBar
PostThreadMessageW
MessageBoxW
MapWindowPoints
ExcludeUpdateRgn
DispatchMessageW
GetClassNameW
CreateAcceleratorTableW
DrawTextExW
gdi32
ExtTextOutA
RealizePalette
AbortPath
EnumEnhMetaFile
SetLayout
CreateBitmapIndirect
GetTextExtentPointI
GetTextExtentPointW
GetMetaRgn
GetOutlineTextMetricsA
SetMetaFileBitsEx
AnimatePalette
GetBitmapBits
GetBrushOrgEx
ScaleWindowExtEx
advapi32
AddAce
CopySid
IsValidAcl
IsTextUnicode
AddAuditAccessAceEx
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.extext Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 364B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bmem Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedat Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
FILE_ID.DIZ