C:\Users\saxton\Desktop\cxobra\x64\Release\ImGui Loader base.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a3f081a8132bdba61b9d463cc1104d6f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a3f081a8132bdba61b9d463cc1104d6f.exe
Resource
win10v2004-20240221-en
General
-
Target
a3f081a8132bdba61b9d463cc1104d6f
-
Size
1.1MB
-
MD5
a3f081a8132bdba61b9d463cc1104d6f
-
SHA1
a761d5e162b9a8ac446cfea731c816c1113ceb43
-
SHA256
0d8cac376cc569d9c685eeadcee8d1c06b5d91054287b5dccc50ef0bbc4896b9
-
SHA512
c9d0abc23f2f744dda9ffc2429fc8bbfe9aa0e8f8e0fbcabb07d6421dae511163a8dbd5bf50182151510d9e5f9b26e5ba75b75ab766a7d0e15b685110fa7c2b7
-
SSDEEP
24576:v6RYj1Hk7/PZ/5yWYftitR/ME7w605FXX/lnKnO93l0fZ:tj1Y/Mvf0tXb03XtnKnO93+x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3f081a8132bdba61b9d463cc1104d6f
Files
-
a3f081a8132bdba61b9d463cc1104d6f.exe windows:6 windows x64 arch:x64
ac725bf528b05a1b16306424cbb0577d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GlobalLock
WideCharToMultiByte
GlobalUnlock
GetModuleHandleA
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
VerSetConditionMask
VerifyVersionInfoW
QueryPerformanceCounter
ReadFile
GetModuleFileNameA
HeapFree
VirtualFree
SetConsoleTitleA
GetCurrentProcess
WriteFile
VirtualAlloc
LoadLibraryExA
InitializeCriticalSectionEx
HeapSize
Sleep
GetLastError
GetCurrentThread
DeleteFileW
HeapReAlloc
RaiseException
LoadLibraryW
HeapAlloc
DecodePointer
GetWindowsDirectoryW
Beep
GetFileSize
DeleteCriticalSection
GetProcessHeap
FreeLibrary
GetTickCount
AllocConsole
SetLastError
RtlVirtualUnwind
GetStdHandle
GetEnvironmentVariableW
GetFileType
GetModuleHandleW
SetEndOfFile
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GlobalFree
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
MoveFileExW
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
ReadConsoleW
GetConsoleMode
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
CreateThread
ExitProcess
WriteConsoleW
GetModuleHandleExW
GetModuleFileNameW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
InterlockedPushEntrySList
RtlUnwindEx
OutputDebugStringW
GetCurrentProcessId
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
TerminateProcess
GlobalAlloc
MultiByteToWideChar
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
ResetEvent
SetEvent
CloseHandle
CreateFileW
DeviceIoControl
GetCommandLineW
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetStringTypeW
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
EncodePointer
LCMapStringEx
WaitForSingleObjectEx
user32
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
GetCursorPos
ReleaseDC
SetCursorPos
SetClipboardData
UnregisterClassA
GetClientRect
SetWindowLongW
SetCursor
SetCapture
BringWindowToTop
SetFocus
SetLayeredWindowAttributes
CreateWindowExA
SetForegroundWindow
ReleaseCapture
RegisterClassExA
IsIconic
UpdateWindow
DefWindowProcA
GetWindowThreadProcessId
DispatchMessageA
GetWindowRect
PostThreadMessageA
SetWindowsHookExA
UnhookWindowsHookEx
TranslateMessage
PeekMessageA
PostQuitMessage
GetDesktopWindow
FindWindowA
GetForegroundWindow
GetWindowLongW
AdjustWindowRectEx
GetKeyState
LoadCursorA
DestroyWindow
GetDC
SetWindowPos
MonitorFromWindow
EnumDisplayMonitors
ScreenToClient
SetWindowTextW
WindowFromPoint
ShowWindow
GetCapture
SetWindowLongA
ClientToScreen
IsChild
GetMonitorInfoA
gdi32
GetDeviceCaps
shell32
ShellExecuteW
xinput1_4
ord4
ord2
imm32
ImmSetCompositionWindow
ImmGetContext
ImmReleaseContext
d3d9
Direct3DCreate9
rpcrt4
UuidToStringA
RpcStringFreeA
UuidCreate
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlImageNtHeader
Sections
.text Size: 643KB - Virtual size: 642KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 195KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 280KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ