C:\Users\sohai\Desktop\Work\dx9\Source\dx9injector\Release\dx9injector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bc394bc376c0eadf3c71b52639bb467297ad3a209f818a0866ad153e65255bed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bc394bc376c0eadf3c71b52639bb467297ad3a209f818a0866ad153e65255bed.exe
Resource
win10v2004-20231215-en
General
-
Target
8aad6043173f491db6316279f0a9ceff.bin
-
Size
483KB
-
MD5
c820fb0edb1b2befc8cfc497da45c77c
-
SHA1
fe64f00cebace311032fbc8b0b6aa1c3b70b4607
-
SHA256
288f04d5cf95c04dcd448a6c9bd25a95d49de55be039c7304dedca59f793497d
-
SHA512
5ea8eecd423a1ade3064b9b96ef93c1b7c8473c9ea4f68cbaeb2f07186cf389cb91f980292cd6324cca0c5bd4ae19843fb7d3dc8f40c0e34c66ae14087da80c0
-
SSDEEP
12288:6uwIpYmMhECcfJc8OMda5eZzhL5aAf2KT:6uwIDfUZawKzhg3KT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/bc394bc376c0eadf3c71b52639bb467297ad3a209f818a0866ad153e65255bed.exe
Files
-
8aad6043173f491db6316279f0a9ceff.bin.zip
Password: infected
-
bc394bc376c0eadf3c71b52639bb467297ad3a209f818a0866ad153e65255bed.exe.exe windows:6 windows x86 arch:x86
Password: infected
5b796d0f2f0f44da2687c092a9d33515
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenProcess
SystemTimeToTzSpecificLocalTime
GetModuleHandleA
GetCurrentDirectoryA
Module32First
Module32Next
FileTimeToSystemTime
CreateThread
ExitThread
VirtualQuery
CreateDirectoryA
CreateRemoteThread
GetConsoleWindow
VirtualAllocEx
GetProcAddress
CloseHandle
Process32Next
LoadLibraryA
Sleep
GetDriveTypeW
CreateToolhelp32Snapshot
GetStdHandle
SetConsoleTitleA
SetConsoleTextAttribute
WriteProcessMemory
Process32First
CreateFileA
VerifyVersionInfoA
VerSetConditionMask
WaitForMultipleObjects
PeekNamedPipe
MoveFileExA
GetEnvironmentVariableA
GetSystemDirectoryA
SleepEx
GetTickCount
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
HeapReAlloc
GetTimeZoneInformation
ReadFile
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
ReadConsoleW
ReadConsoleInputW
SetConsoleMode
HeapFree
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapAlloc
GetFileType
GetLastError
FormatMessageA
FormatMessageW
WideCharToMultiByte
LocalFree
FindClose
FindNextFileW
GetModuleHandleW
GetCurrentDirectoryW
CreateFileW
DeleteFileW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
RemoveDirectoryW
SetEndOfFile
SetFilePointerEx
DeviceIoControl
AreFileApisANSI
MultiByteToWideChar
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
EncodePointer
DecodePointer
LCMapStringEx
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetConsoleCP
GetModuleFileNameW
WriteFile
GetCommandLineA
GetCommandLineW
GetFileSizeEx
FreeLibraryAndExitThread
user32
MessageBoxA
FindWindowA
d3d9
Direct3DCreate9
iphlpapi
GetAdaptersInfo
wininet
DeleteUrlCacheEntry
urlmon
URLDownloadToFileA
crypt32
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
ws2_32
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
listen
ntohl
recvfrom
WSAStartup
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSASetLastError
select
__WSAFDIsSet
WSAGetLastError
inet_pton
socket
send
recv
closesocket
accept
gethostname
freeaddrinfo
sendto
htonl
getaddrinfo
ioctlsocket
WSACleanup
wldap32
ord27
ord26
ord22
ord41
ord32
ord45
ord60
ord211
ord46
ord143
ord33
ord35
ord79
ord30
ord200
ord301
ord50
advapi32
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
CryptGenRandom
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
Sections
.text Size: 739KB - Virtual size: 738KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ