Static task
static1
Behavioral task
behavioral1
Sample
Need for Speed Most Wanted - By AllTypeHacks/NFS MW.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Need for Speed Most Wanted - By AllTypeHacks/NFS MW.exe
Resource
win10v2004-20240221-en
General
-
Target
ATH - NFS Most Wanted [HC Ripped].zip
-
Size
356.1MB
-
MD5
f4487e229252001a0084df3e95f0de7d
-
SHA1
838c844355a927e22310c155115350b4911eacea
-
SHA256
9265161a3e3cd892ff83c5550f4febb92ba4b1e8ceed4aac8bcb627469b5e048
-
SHA512
ee83fcdc69f0031f5d4f100f9587500b30377965030aee7750c5a811f042079ec299df3773130adda4385e82f1f2091f4fc61d854d76b1c13faa8cce930dccef
-
SSDEEP
6291456:vG8iYO/6B+incbsKJOi2F05O6WBM2A4AgivnbaNZG0AMbPzCwFC0O2c:vNxO/U+i/L2vWBMpnbarGFMimC0OT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Need for Speed Most Wanted - By AllTypeHacks/NFS MW.exe
Files
-
ATH - NFS Most Wanted [HC Ripped].zip.zip
-
Need for Speed Most Wanted - By AllTypeHacks/Install Notes.txt
-
Need for Speed Most Wanted - By AllTypeHacks/NFS MW.exe.exe windows:4 windows x86 arch:x86
26fbf291a240b90efae516aa59675d40
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDlgItem
IsDlgButtonChecked
PostMessageA
MessageBoxW
KillTimer
SetTimer
DialogBoxParamW
DialogBoxParamA
SetWindowLongA
GetWindowLongA
GetWindowTextLengthW
GetWindowTextW
GetWindowTextLengthA
GetWindowTextA
SetWindowTextW
SetWindowTextA
SendMessageW
SendMessageA
LoadStringW
LoadStringA
CharUpperW
CharUpperA
EndDialog
oleaut32
SysAllocString
VariantClear
SysFreeString
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetFileInfoA
SHBrowseForFolderA
ole32
CoUninitialize
CoInitialize
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
memset
memcpy
free
malloc
memmove
_CxxThrowException
_purecall
memcmp
__CxxFrameHandler
kernel32
WideCharToMultiByte
GetStartupInfoA
GetModuleHandleA
InitializeCriticalSection
ResetEvent
SetEvent
CreateEventA
WaitForSingleObject
VirtualFree
VirtualAlloc
Sleep
FileTimeToLocalFileTime
WaitForMultipleObjects
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetModuleHandleW
GetProcAddress
FileTimeToSystemTime
SetEndOfFile
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
FindFirstFileW
FindFirstFileA
FindClose
GetCurrentDirectoryW
GetCurrentDirectoryA
GetFullPathNameW
GetFullPathNameA
lstrlenA
DeleteFileW
DeleteFileA
CreateDirectoryW
CreateDirectoryA
MoveFileW
RemoveDirectoryW
SetFileAttributesW
MoveFileA
RemoveDirectoryA
SetFileAttributesA
SetLastError
CreateFileW
SetFileTime
CloseHandle
FormatMessageW
FormatMessageA
LocalFree
GetModuleFileNameW
GetModuleFileNameA
AreFileApisANSI
GetCommandLineW
DeleteCriticalSection
GetVersionExA
MultiByteToWideChar
GetLastError
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Need for Speed Most Wanted - By AllTypeHacks/Read Me.txt