D:\(◆開発用ディレクトリ)\[▼作業用]プログラム\RPGドライブプログラム-VS2022用\Release\Game - Pro版.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d7034428b7221b30ccfbd8b898014ede078ecc4c621cdb55f8b62e104c583107.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d7034428b7221b30ccfbd8b898014ede078ecc4c621cdb55f8b62e104c583107.exe
Resource
win10v2004-20231222-en
General
-
Target
d7034428b7221b30ccfbd8b898014ede078ecc4c621cdb55f8b62e104c583107
-
Size
7.1MB
-
MD5
5614f6be9e0e5fcac6fe55d3682bb923
-
SHA1
c0aa6df0242d0eaafabbbc1bf1fc8c32251204b4
-
SHA256
d7034428b7221b30ccfbd8b898014ede078ecc4c621cdb55f8b62e104c583107
-
SHA512
002c71ade555ecdfc5b785fa45a0f89adfd69337828c59e68526e28014d1d66c87e5923eab51945a9c8613343ae1607b4e9845626b1b60b59eb9f9ae0b020cbd
-
SSDEEP
196608:E1EykZKljZqrHErCur+42crn8SVfHshWegISKYIwBKtoWaK/:VZ8qrMiYIwBKtoWX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7034428b7221b30ccfbd8b898014ede078ecc4c621cdb55f8b62e104c583107
Files
-
d7034428b7221b30ccfbd8b898014ede078ecc4c621cdb55f8b62e104c583107.exe windows:6 windows x86 arch:x86
96c056e63e095716e2a1eaf1f87149d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathIsDirectoryW
PathFileExistsW
PathIsDirectoryA
psapi
GetProcessMemoryInfo
kernel32
FindNextFileA
FindClose
GetCurrentDirectoryA
GetACP
SetCurrentDirectoryA
GetFileAttributesA
CreateFileA
CloseHandle
CreateDirectoryA
GetTickCount
GetModuleFileNameW
LoadLibraryW
GetProcAddress
FreeLibrary
CreateDirectoryW
GetModuleFileNameA
FindFirstFileW
FindNextFileW
WriteFile
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
GetModuleHandleA
GetLocaleInfoA
OpenProcess
GetExitCodeThread
Sleep
CopyFileA
GetLastError
GetVersionExA
DeleteFileA
GlobalAlloc
GetCurrentDirectoryW
DecodePointer
SetCurrentDirectoryW
GlobalLock
RemoveDirectoryA
GetCurrentProcessId
GlobalMemoryStatusEx
CopyFileW
WideCharToMultiByte
GetDiskFreeSpaceExA
GlobalUnlock
FlushFileBuffers
TlsAlloc
WriteConsoleW
SetEndOfFile
HeapSize
HeapReAlloc
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
GetFileAttributesExW
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
FindFirstFileA
MultiByteToWideChar
DeleteCriticalSection
SetLastError
RtlUnwind
RaiseException
OutputDebugStringW
HeapAlloc
HeapFree
GetStdHandle
MoveFileExW
FreeLibraryAndExitThread
ExitProcess
ExitThread
CreateThread
DeleteFileW
TlsGetValue
TlsSetValue
GetModuleHandleExW
LoadLibraryExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
EncodePointer
LocalFree
LCMapStringEx
GetStringTypeW
GetCPInfo
LoadLibraryA
CreateFileW
ReadFile
LocalAlloc
TlsFree
user32
GetScrollPos
GetFocus
ReleaseDC
IsClipboardFormatAvailable
GetDlgItem
CreateDialogParamA
SetClipboardData
SendMessageA
ClipCursor
SendDlgItemMessageA
GetClipboardData
SetFocus
GetMonitorInfoA
MonitorFromPoint
GetWindowRect
DestroyWindow
GetDC
SetWindowPos
MessageBoxW
EnumDisplayMonitors
GetSystemMetrics
MessageBoxA
ShowWindow
GetAsyncKeyState
OpenClipboard
ClientToScreen
CloseClipboard
EmptyClipboard
GetCursorPos
gdi32
RemoveFontResourceExA
GetDeviceCaps
AddFontResourceExW
shell32
ShellExecuteW
ShellExecuteA
SHGetFolderPathA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
wininet
HttpQueryInfoA
HttpOpenRequestA
InternetCrackUrlA
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetReadFile
HttpSendRequestA
crypt32
CryptBinaryToStringA
advapi32
RegCloseKey
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 692KB - Virtual size: 691KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 9.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
��(�u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE