Q:\git_work_3\wegame_platform\wegame_client\plugins\repair_prompt\Release\repair_prompt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
21b2a584819e2f2da414073499f3ac174f94da76cc423b8eee38e6349da6ce99.exe
Resource
win7-20231215-en
General
-
Target
21b2a584819e2f2da414073499f3ac174f94da76cc423b8eee38e6349da6ce99
-
Size
4.0MB
-
MD5
5f8c29597976c8bf2ceac4a62187b39c
-
SHA1
4daa4cb538adbcc531ac42800e148c48c5bfca45
-
SHA256
21b2a584819e2f2da414073499f3ac174f94da76cc423b8eee38e6349da6ce99
-
SHA512
09846765ff26452fcdcd8323f05ef1f2a55fdb9c9d9e33a1b806f75e71c7784f2b00774b81bbe822b8e99b6087f1b9f6422c7233ce1ace9e1de4707c3316f524
-
SSDEEP
24576:RXvyb/1zhcrszNQqLtWiSlTI7u0PmSN3:5vyJiUQgwTI7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21b2a584819e2f2da414073499f3ac174f94da76cc423b8eee38e6349da6ce99
Files
-
21b2a584819e2f2da414073499f3ac174f94da76cc423b8eee38e6349da6ce99.exe windows:5 windows x86 arch:x86
d7e275381b7ae5c9ff30dd4d667353d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObjectEx
CloseHandle
CreateThread
ResetEvent
GetCurrentProcessId
CreateEventA
GetTickCount
CreateDirectoryW
EnterCriticalSection
GetFullPathNameW
GetLongPathNameW
ReleaseSemaphore
WriteFile
OutputDebugStringA
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
CreateFileW
UnmapViewOfFile
MultiByteToWideChar
GetLastError
OutputDebugStringW
DeleteCriticalSection
CreateSemaphoreW
WideCharToMultiByte
CreateFileMappingW
MapViewOfFile
SetEvent
FindNextFileW
SetEndOfFile
FindClose
GetFileAttributesExW
DeleteFileW
SetFilePointerEx
SetLastError
GetModuleHandleA
GetModuleHandleW
CreateProcessW
TerminateThread
GetCurrentThreadId
FlushFileBuffers
WaitForSingleObject
HeapSize
WriteConsoleW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
TryEnterCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
FormatMessageW
GetStringTypeW
DuplicateHandle
Sleep
GetCurrentProcess
SwitchToThread
GetCurrentThread
FindFirstFileExW
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetProcAddress
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RtlUnwind
RaiseException
ExitThread
GetModuleHandleExW
ReadFile
SetEnvironmentVariableA
ExitProcess
GetStdHandle
GetACP
GetFileType
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
ReadConsoleW
HeapReAlloc
user32
SendMessageA
GetDlgItem
DefWindowProcA
EndDialog
DialogBoxParamA
LoadStringW
LoadBitmapA
shell32
SHCreateDirectoryExW
advapi32
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
Sections
.text Size: 401KB - Virtual size: 400KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE