c:\_InfestationX\src\RSUpdate\Release\WarZTheJokerZ.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6a451a12741920c39ccd9b279aab40c8a595f743e7409879183d815f88e726c3.exe
Resource
win11-20231222-en
General
-
Target
6a451a12741920c39ccd9b279aab40c8a595f743e7409879183d815f88e726c3.exe
-
Size
5.9MB
-
MD5
48fce284e7ea272d6e10c79cbf330c86
-
SHA1
ab0c990e8a33ae0712dee7fff409d4fc7ab86036
-
SHA256
6a451a12741920c39ccd9b279aab40c8a595f743e7409879183d815f88e726c3
-
SHA512
e6d88f295e18bf16116d8f077a70c4c2ff138460fc2a98e53ed7d9aebe8188cc7b74190735765016a92dee326303eeb4309e327a681f91d5f09d4461597bf2e1
-
SSDEEP
98304:U3AnTSl9tMY0Y0QTywYR5vAnkcFRv4lYVlWcfAreCH2Qll6PDkZ5txb5hFE2:0AnGlToY0QmPR54TRQlYVlW8YWQllAIh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a451a12741920c39ccd9b279aab40c8a595f743e7409879183d815f88e726c3.exe
Files
-
6a451a12741920c39ccd9b279aab40c8a595f743e7409879183d815f88e726c3.exe.exe windows:5 windows x86 arch:x86
d76a9a566ca4b1fe4b2c85fab64863d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
d3dx9_43
D3DXCreateTextureFromFileInMemoryEx
D3DXCreateVolumeTextureFromFileInMemoryEx
D3DXCreateCubeTextureFromFileInMemoryEx
D3DXCreateFontA
D3DXSaveSurfaceToFileA
D3DXGetImageInfoFromFileInMemory
D3DXCreateTextureFromFileInMemory
d3d9
Direct3DCreate9
kernel32
FreeLibrary
CreateFileW
GetFileSize
WriteFile
ReadFile
GetFileTime
FormatMessageA
GetComputerNameA
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapCreate
HeapReAlloc
GetConsoleCP
IsValidCodePage
GetOEMCP
GetACP
GetTickCount
GetLocalTime
GetSystemTime
SetFileAttributesW
CreateDirectoryW
GetFileAttributesW
SetFilePointer
DeleteFileW
MoveFileW
GetTempPathA
GetTempPathW
GetCurrentDirectoryW
GetFullPathNameW
GetLastError
InterlockedIncrement
InitializeCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
SetFileAttributesA
MoveFileA
SystemTimeToFileTime
FileTimeToSystemTime
CreateThread
LoadLibraryA
GetCurrentThreadId
CreateFileA
FindClose
MultiByteToWideChar
GetModuleFileNameA
GetConsoleMode
DeleteCriticalSection
GetFileAttributesA
CreateDirectoryA
FindFirstFileA
GetCPInfo
GetStdHandle
SetHandleCount
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
ExitProcess
GetModuleHandleW
GetProcessHeap
GetFileType
GetDriveTypeA
FileTimeToLocalFileTime
RaiseException
RtlUnwind
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
UnhandledExceptionFilter
ExitThread
GetSystemTimeAsFileTime
CopyFileA
VirtualAlloc
VirtualFree
SetUnhandledExceptionFilter
GetCurrentProcessId
CreateToolhelp32Snapshot
Module32First
Module32Next
CreateFileMappingA
UnmapViewOfFile
InterlockedDecrement
MulDiv
DuplicateHandle
GetCurrentThread
TryEnterCriticalSection
InterlockedExchangeAdd
SetEndOfFile
GetSystemInfo
MapViewOfFile
InterlockedExchange
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
QueryPerformanceCounter
QueryPerformanceFrequency
LocalFree
GetModuleHandleA
DeleteFileA
SetConsoleTitleA
AllocConsole
Sleep
GlobalAlloc
GlobalUnlock
GlobalLock
GetCurrentProcess
TerminateProcess
GetCurrentDirectoryA
GetFullPathNameA
CreateEventA
SetEvent
OutputDebugStringA
OpenEventA
LeaveCriticalSection
EnterCriticalSection
CloseHandle
TerminateThread
WaitForSingleObject
GetVersionExA
GetProcAddress
GlobalMemoryStatusEx
user32
GetWindowLongA
SetWindowPos
SendMessageA
SetFocus
ShowCursor
GetClientRect
ClientToScreen
PostQuitMessage
PeekMessageW
GetMessageW
RegisterClassA
CreateWindowExA
GetActiveWindow
InvalidateRect
UpdateWindow
BeginPaint
EndPaint
SetClipboardViewer
ChangeClipboardChain
MessageBoxA
LoadIconA
LoadCursorA
LoadStringW
SetRect
AdjustWindowRect
GetCursorPos
GetWindowRect
SetCapture
ReleaseCapture
DefWindowProcA
SetWindowLongA
SetWindowTextA
ShowWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetCaretBlinkTime
GetFocus
GetKeyState
OpenClipboard
GetClipboardData
CloseClipboard
GetAsyncKeyState
SwitchToThisWindow
ClipCursor
gdi32
DeleteObject
GetTextExtentPoint32A
SelectObject
CreateDIBSection
SetTextAlign
SetBkColor
SetTextColor
DeleteDC
GetDeviceCaps
CreateICA
GetStockObject
CreateFontA
CreateCompatibleDC
LineTo
MoveToEx
ExtTextOutA
CreatePen
SetMapMode
advapi32
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
GetUserNameA
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
CryptExportKey
CryptDestroyKey
CryptGetUserKey
CryptEnumProvidersA
CryptGetProvParam
CryptAcquireContextW
RegOpenKeyExA
shell32
ShellExecuteA
SHGetFolderPathA
ole32
CoCreateInstance
CoInitializeEx
CoInitialize
oleaut32
SysFreeString
SysAllocString
iphlpapi
GetAdaptersInfo
SendARP
dbghelp
MakeSureDirectoryPathExists
MiniDumpWriteDump
ws2_32
WSAGetLastError
setsockopt
ioctlsocket
socket
WSAStartup
ntohs
inet_ntoa
getsockname
gethostbyname
inet_addr
htons
connect
select
__WSAFDIsSet
bind
closesocket
shutdown
send
WSACleanup
recv
getsockopt
dinput8
DirectInput8Create
crypt32
CertSetCertificateContextProperty
CertDuplicateCertificateContext
CertNameToStrW
CryptDecodeObject
CertGetCertificateContextProperty
CertCreateCertificateContext
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
CertGetSubjectCertificateFromStore
CryptMsgControl
CryptMsgGetParam
CryptMsgClose
CryptMsgUpdate
CryptMsgOpenToDecode
CryptDecryptMessage
CryptEncodeObject
CryptEncryptMessage
CertFreeCertificateContext
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 742KB - Virtual size: 742KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 784KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ