Static task
static1
Behavioral task
behavioral1
Sample
CheatForRustMe.rar
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
CheatForRustMe.rar
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Extreme Injetor v3.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Extreme Injetor v3.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
laze.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
laze.dll
Resource
win10v2004-20240221-en
General
-
Target
CheatForRustMe.rar
-
Size
7.8MB
-
MD5
494b3caf6fa77be9691e9345e7de0593
-
SHA1
3fc263b0235b4d877e85d9628080df686d01f7f3
-
SHA256
2f0502ab83b1a8becff9fde553a7cad9da3a3afc2cf53f16e4ebefd0929cd41e
-
SHA512
46b2159941d5ebf15d771e4f7667b1ec661d9f947ee34105f00ea23e1d344760b62834cf26624e57b7ad9d3f6bde560068f0a774379778cd496b85240028e0c7
-
SSDEEP
196608:Li4F5Kwhnnc1oy0lJMBSRScCTLjN39oeWGRddw5ybJ1PYr6U:Li2phnnc1oLMSREHroeWGBRXPYx
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Extreme Injetor v3.exe unpack001/laze.dll
Files
-
CheatForRustMe.rar.rar
Password: 123123
-
Extreme Injetor v3.exe.exe windows:4 windows x86 arch:x86
Password: 123123
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 770B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7.1MB - Virtual size: 7.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
laze.dll.dll windows:6 windows x64 arch:x64
Password: 123123
d5c9ee21e49aea38fb2a479ca1448127
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GlobalUnlock
LoadLibraryA
FreeLibrary
QueryPerformanceFrequency
QueryPerformanceCounter
VirtualFree
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapCreate
VirtualProtect
HeapFree
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
Sleep
HeapReAlloc
HeapAlloc
GetThreadContext
GetModuleHandleW
FlushInstructionCache
SetThreadContext
OpenThread
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileSizeEx
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
GlobalLock
GetLocaleInfoW
LCMapStringW
CompareStringW
TerminateProcess
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
GlobalFree
GlobalAlloc
WideCharToMultiByte
ReadProcessMemory
GetProcAddress
GetTickCount64
OpenProcess
GetModuleHandleA
GetCurrentProcess
MultiByteToWideChar
GetModuleFileNameW
lstrlenW
WaitNamedPipeW
GetCurrentProcessId
CloseHandle
GetLastError
CreateThread
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
InterlockedFlushSList
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetCPInfo
GetStringTypeW
LCMapStringEx
DecodePointer
EncodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetFileInformationByHandleEx
ReadFile
CreateFileW
PeekNamedPipe
WriteFile
IsValidLocale
AreFileApisANSI
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
InitializeSListHead
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
GetExitCodeThread
LocalFree
FormatMessageA
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
RtlUnwind
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SendMessageA
GetForegroundWindow
WindowFromDC
CallWindowProcA
GetAsyncKeyState
WindowFromPoint
GetCursorPos
GetWindowRect
GetWindowThreadProcessId
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
SetWindowLongPtrA
SendInput
keybd_event
OpenClipboard
GetKeyState
GetMessageExtraInfo
LoadCursorA
ScreenToClient
GetCapture
ClientToScreen
TrackMouseEvent
SetCapture
SetCursor
GetClientRect
IsWindowUnicode
ReleaseCapture
SetCursorPos
advapi32
GetTokenInformation
RegSetValueExW
RegCreateKeyExW
RegCloseKey
GetCurrentHwProfileA
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetSidIdentifierAuthority
shell32
ShellExecuteExW
ShellExecuteA
opengl32
glPopMatrix
glPolygonOffset
glPopAttrib
glEnable
glVertex3f
glDepthMask
glLoadMatrixf
glEnd
glMatrixMode
glLineWidth
glColor3f
glBlendFunc
glLoadIdentity
glHint
glAlphaFunc
glBegin
glTranslatef
glPushAttrib
glShadeModel
glGetFloatv
glPushMatrix
glDisable
glColor4f
glScaled
glVertex3d
winmm
PlaySoundA
ws2_32
WSAGetLastError
WSACleanup
closesocket
inet_pton
WSAStartup
send
socket
connect
recv
htons
ioctlsocket
imm32
ImmReleaseContext
ImmGetContext
ImmSetCandidateWindow
ImmSetCompositionWindow
Sections
.text Size: - Virtual size: 740KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 809KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.&W[ Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.IgF Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
..sv Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 953B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ