E:\bamboo-agent-home-2\xml-data\build-dir\PGSC-MON-JOB1\monolith\Build\ProtectorGamesApp\Release\GameLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fe92f0862d7680305648012fed98548fdb1b86d5f77ef0f486a11cff37ddcd59.exe
Resource
win7-20231215-en
General
-
Target
fe92f0862d7680305648012fed98548fdb1b86d5f77ef0f486a11cff37ddcd59
-
Size
1.2MB
-
MD5
f266c118b28f01d42432fbc9a436f088
-
SHA1
84cd990f7fe6a6c709c675acfa6240174371f093
-
SHA256
fe92f0862d7680305648012fed98548fdb1b86d5f77ef0f486a11cff37ddcd59
-
SHA512
84baabf57e09ff83f314a7828fb1e4c90c120c595ac4e6ecfa2dcf9a2fcf636779b7afd613a24436210dd6e0e30a16d9d13f5bccfb067ea90c36861b8e60517d
-
SSDEEP
24576:szJZtW/PgqM7MOBcl6WKlH7wXGX/KSMHdU23gXe4i7ojhsP5Lgrk1TWb4AN5:sz0BM7MD6WKl0GX/IO2+e30jaNf1TWbp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe92f0862d7680305648012fed98548fdb1b86d5f77ef0f486a11cff37ddcd59
Files
-
fe92f0862d7680305648012fed98548fdb1b86d5f77ef0f486a11cff37ddcd59.exe windows:6 windows x86 arch:x86
f1c326e06f563a5bcb71d8fb7b3a54fe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcessHeap
ReleaseMutex
MultiByteToWideChar
WideCharToMultiByte
GetPrivateProfileSectionNamesW
GetGeoInfoW
GetUserGeoID
GetUserDefaultUILanguage
TerminateThread
CreateEventA
GetTickCount
CreateDirectoryW
OpenMutexW
GetSystemInfo
OpenFileMappingW
FormatMessageA
GetModuleHandleA
FindClose
FindNextFileW
GetFileAttributesW
GetFileSizeEx
GetFullPathNameW
FindResourceExW
LoadResource
GetCurrentDirectoryW
FileTimeToLocalFileTime
GetSystemTime
SystemTimeToFileTime
GetPrivateProfileStringW
OutputDebugStringW
SetLastError
CreateMutexA
OpenMutexA
CreateFileMappingA
OpenFileMappingA
FlushFileBuffers
SetFilePointerEx
GetVolumeInformationA
DeviceIoControl
GetWindowsDirectoryA
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
ReadConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
GetStdHandle
ExitProcess
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
MoveFileExW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
GetCommandLineW
GetCommandLineA
LoadLibraryExW
HeapSize
HeapAlloc
HeapDestroy
SetEndOfFile
GetFileSize
CreateFileW
K32EnumProcesses
GetModuleFileNameW
VirtualQuery
GetNativeSystemInfo
GetVersionExW
DuplicateHandle
GetExitCodeThread
WaitForMultipleObjects
CreateRemoteThread
FlushInstructionCache
VirtualProtectEx
CreateEventW
WriteProcessMemory
VirtualAllocEx
UnmapViewOfFile
MapViewOfFile
IsWow64Process
ReadFile
SetFilePointer
CreateFileA
DecodePointer
RaiseException
InitializeCriticalSectionEx
OpenEventW
ResumeThread
AssignProcessToJobObject
CreateProcessW
SetInformationJobObject
CreateJobObjectW
SetEvent
GetCurrentThread
GetProcAddress
GetModuleHandleW
GetCurrentProcess
CheckRemoteDebuggerPresent
IsDebuggerPresent
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
K32GetProcessImageFileNameW
OpenProcess
QueryInformationJobObject
TerminateJobObject
CreateFileMappingW
CreateMutexW
GetCurrentThreadId
OpenThread
CreateThread
DeleteFileW
GetLastError
GetExitCodeProcess
CloseHandle
GetCurrentProcessId
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
WaitForSingleObjectEx
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
HeapReAlloc
HeapFree
FreeLibrary
WaitForSingleObject
GetTickCount64
ResetEvent
LocalFree
GetOEMCP
user32
FindWindowW
ShowWindow
SetFocus
PostMessageW
IsWindowVisible
ChangeDisplaySettingsW
PostQuitMessage
BroadcastSystemMessageW
DestroyWindow
GetClassNameA
ReleaseDC
GetDC
EnumDisplaySettingsW
GetDlgItem
BringWindowToTop
GetWindowThreadProcessId
FindWindowA
RegisterWindowMessageA
GetSystemMetrics
DialogBoxParamW
AttachThreadInput
MsgWaitForMultipleObjectsEx
PeekMessageW
TranslateMessage
SetForegroundWindow
DispatchMessageW
SetWindowTextW
SetDlgItemTextW
LoadIconW
SendMessageW
CreateDialogParamW
IsWindow
GetForegroundWindow
MessageBoxW
gdi32
GetDeviceCaps
advapi32
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetValueExA
RegSetKeySecurity
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
ImpersonateSelf
StartServiceW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegCreateKeyExW
CryptGenRandom
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
CryptDecrypt
CryptSetKeyParam
CryptDestroyKey
CryptDeriveKey
RevertToSelf
ImpersonateLoggedOnUser
OpenThreadToken
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetUserNameW
shell32
SHGetKnownFolderPath
ShellExecuteExA
ole32
CoSetProxyBlanket
CoInitializeSecurity
CoTaskMemFree
StringFromCLSID
CoCreateInstance
CoUninitialize
CoInitialize
CoInitializeEx
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
VariantChangeType
shlwapi
PathUnquoteSpacesW
PathFileExistsA
PathFileExistsW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
secur32
GetUserNameExW
wininet
InternetCloseHandle
InternetConnectA
InternetReadFile
InternetQueryOptionA
InternetGetLastResponseInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetOpenA
HttpSendRequestA
HttpQueryInfoA
crypt32
CryptMsgGetAndVerifySigner
CertFreeCertificateContext
CertNameToStrW
CryptQueryObject
CryptMsgClose
wintrust
WinVerifyTrust
ws2_32
WSAStartup
gethostbyname
ntohl
iphlpapi
GetAdaptersInfo
rpcrt4
UuidCreate
Sections
.text Size: 374KB - Virtual size: 373KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.pecode Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pccode Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gchr Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 588KB - Virtual size: 592KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE