F:\Code\Audit\InsideSrc\ngap\new_version\Target\x86\Release\symbols\NAnalyser.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fd89bac265bc45742abb891ca2fb59f4a38831ba9ffe43dcf5284216e1362db7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd89bac265bc45742abb891ca2fb59f4a38831ba9ffe43dcf5284216e1362db7.exe
Resource
win10v2004-20240221-en
General
-
Target
fd89bac265bc45742abb891ca2fb59f4a38831ba9ffe43dcf5284216e1362db7
-
Size
1.9MB
-
MD5
d95044ad6ac36daaf4cbe1b9b12a1644
-
SHA1
68eac1b38e2b4ceaadfc368ea29ac231f19680e9
-
SHA256
fd89bac265bc45742abb891ca2fb59f4a38831ba9ffe43dcf5284216e1362db7
-
SHA512
863e38fc8424c3c151578e84c7636e67c4f5d9c5dcc72c43c46879ddd8d5908b8f289c9b3847a7017f62aa8bb3ec36746e4c01ba6e1dc29e995cc13d15455c82
-
SSDEEP
49152:FQ+QQMqlbkVXuL5TpFEazB7Ku0GaXO94IBAUZLYFi1KY:rQQd2eTLNtBAUZL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd89bac265bc45742abb891ca2fb59f4a38831ba9ffe43dcf5284216e1362db7
Files
-
fd89bac265bc45742abb891ca2fb59f4a38831ba9ffe43dcf5284216e1362db7.exe windows:5 windows x86 arch:x86
09ba989fee62e69631bd46459b718e81
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetDriveTypeW
CompareStringW
SetEnvironmentVariableA
GetCommandLineA
GetProcessHeap
HeapFree
HeapAlloc
CreateThread
GlobalFree
ReadFileEx
CreateNamedPipeA
DisconnectNamedPipe
GetOverlappedResult
CreateEventA
GlobalAlloc
WaitForSingleObjectEx
ConnectNamedPipe
SetEvent
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetCurrentDirectoryW
GetFullPathNameA
PeekNamedPipe
GetLastError
OpenFileMappingA
CreateFileMappingA
FlushViewOfFile
UnmapViewOfFile
MapViewOfFile
LocalFree
OpenMutexA
ReleaseMutex
GetTimeZoneInformation
GetDriveTypeA
GetSystemInfo
GetWindowsDirectoryA
SetErrorMode
GetTempPathA
GetPrivateProfileStringA
GetExitCodeThread
CreateMutexA
FindResourceA
SizeofResource
LoadResource
LockResource
FreeResource
CopyFileA
GetVersionExA
MoveFileExA
WritePrivateProfileStringA
FindFirstFileExA
FileTimeToLocalFileTime
DeleteFileA
GetFileAttributesA
FileTimeToSystemTime
CreateDirectoryA
OpenEventA
CreateIoCompletionPort
ResetEvent
PostQueuedCompletionStatus
GetQueuedCompletionStatus
IsBadWritePtr
GetDateFormatA
GetTimeFormatA
GetModuleHandleA
Module32Next
Module32First
lstrcmpW
ReadProcessMemory
GetFileInformationByHandle
DuplicateHandle
CreateToolhelp32Snapshot
FindNextFileA
Process32Next
FindClose
GetLogicalDriveStringsA
FindFirstFileA
TerminateThread
GetVolumeInformationA
OpenProcess
WaitForSingleObject
Process32First
lstrcpynA
lstrlenA
SetEndOfFile
CreateFileW
CreateFileA
WriteConsoleW
SetStdHandle
HeapReAlloc
Sleep
FreeLibrary
CloseHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
ReadFile
LoadLibraryW
IsValidCodePage
GetOEMCP
GetACP
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
GetLocalTime
HeapSetInformation
GetStartupInfoW
RaiseException
GetCPInfo
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
HeapCreate
WriteFile
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
GetLocaleInfoW
advapi32
OpenServiceA
CloseServiceHandle
DeleteService
CreateServiceA
StartServiceA
OpenSCManagerA
ControlService
LsaClose
LsaFreeMemory
LsaLookupSids
LsaOpenPolicy
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegFlushKey
RegCreateKeyExA
ChangeServiceConfigA
QueryServiceStatus
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ntdll
NtQueryValueKey
NtCreateSemaphore
NtWriteFile
RtlRaiseStatus
NtReleaseSemaphore
RtlMultiByteToUnicodeN
RtlUpcaseUnicodeChar
RtlCreateHeap
RtlGetVersion
NtDeviceIoControlFile
NtCreateKeyedEvent
NtWaitForKeyedEvent
NtReleaseKeyedEvent
RtlStringFromGUID
RtlAllocateHeap
RtlInterlockedPushEntrySList
RtlInterlockedPopEntrySList
RtlMultiByteToUnicodeSize
RtlFreeHeap
RtlInitializeSListHead
NtQueryObject
NtCreateEvent
NtSetEvent
NtDuplicateObject
NtOpenProcess
NtSetSecurityObject
NtQueryInformationToken
NtQueryVirtualMemory
NtOpenProcessToken
NtReadVirtualMemory
NtWaitForSingleObject
NtQueryInformationProcess
NtQuerySymbolicLinkObject
NtSetInformationFile
NtOpenSymbolicLinkObject
NtQueryInformationThread
NtQuerySystemInformation
NtOpenKey
NtTerminateThread
NtQuerySecurityObject
RtlConvertSidToUnicodeString
NtAllocateVirtualMemory
NtFreeVirtualMemory
ZwQueryInformationFile
NtClose
ZwQuerySystemInformation
RtlUnwind
RtlFreeUnicodeString
iphlpapi
GetAdaptersInfo
packet
PacketGetAdapterNames
PacketAllocatePacket
PacketOpenAdapter
PacketReceivePacket
PacketSetReadTimeout
PacketSendPacket
PacketSetHwFilter
PacketSetBuff
PacketInitPacket
PacketCloseAdapter
PacketSetNumWrites
PacketGetNetInfoEx
PacketFreePacket
ws2_32
getpeername
WSAWaitForMultipleEvents
WSAResetEvent
WSACloseEvent
inet_addr
WSARecvFrom
WSARecv
bind
closesocket
setsockopt
WSASend
htons
ntohs
htonl
listen
gethostbyname
WSAStartup
ntohl
WSASocketA
WSAEventSelect
connect
inet_ntoa
WSASetEvent
shutdown
WSACreateEvent
WSAEnumNetworkEvents
WSAGetLastError
WSASendTo
netapi32
Netbios
psapi
GetModuleFileNameExA
EnumProcessModules
mswsock
AcceptEx
user32
EnumWindows
GetWindowTextA
EnumChildWindows
GetWindowThreadProcessId
ole32
CoInitialize
CoCreateGuid
oleaut32
SysAllocString
VariantClear
SysFreeString
rzxdivert
WinDivertClose
Exports
Exports
?AnalyseInitialize@@YG_NXZ
?GetGameAccountFromProcess@@YG_NP6GHPAU_ANALYSER_PROCESS_GAME@@@Z@Z
?GetRunningBrowserFromProcessList@@YG_NPAU_BROWSER_INFO@@@Z
_getAccount@0
Sections
.text Size: 882KB - Virtual size: 882KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 937KB - Virtual size: 937KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 383KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ