D:\work\stcode\GameLauncher\BrowserLauncher\Bin\BrowserLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a9a7b95a8866cd5fe7cdb0a261684cb0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9a7b95a8866cd5fe7cdb0a261684cb0.exe
Resource
win10v2004-20240226-en
General
-
Target
a9a7b95a8866cd5fe7cdb0a261684cb0
-
Size
286KB
-
MD5
a9a7b95a8866cd5fe7cdb0a261684cb0
-
SHA1
7b49fdab8b5d3f33a40cd14bb94c01a12ebb30d3
-
SHA256
cef7b164b60fa2bc94d38b3f94d75e6737f6b6eaf9100ce1f2a4503e88d4db7c
-
SHA512
89fd1b9601b1a7671e85197186aa1b06a8e7495a9b46394834cb9184caf37eaf6457f91487c5695517de440cb580bb8c0379edc1dedea2aa7b14c22d3219b839
-
SSDEEP
6144:orJ04Jb7OAvd7k/oxQWMsCGFwjOgpHZGmAOvyFAasfEn:o+Wb7t17k/GQWMsCcngBZGmhaQEn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9a7b95a8866cd5fe7cdb0a261684cb0
Files
-
a9a7b95a8866cd5fe7cdb0a261684cb0.exe windows:6 windows x86 arch:x86
0851697eb18d5ba01115847ac73fe4b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
GetLastError
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
CreateFileW
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
OutputDebugStringW
SetEndOfFile
CreateMutexA
ReleaseMutex
Sleep
DeleteFileA
DeleteFileW
CreateThread
GetLogicalDrives
DecodePointer
GetModuleFileNameA
ReadFile
ExpandEnvironmentStringsA
CloseHandle
CreateFileA
WriteConsoleW
HeapSize
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
GetProcessHeap
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
HeapReAlloc
GetConsoleMode
GetStringTypeW
LCMapStringW
CompareStringW
GetDriveTypeA
GetFileSizeEx
WriteFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
Process32First
Process32Next
GetComputerNameA
GlobalAlloc
GlobalFree
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcmpiA
GetProcessTimes
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
EncodePointer
RaiseException
SetLastError
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
GetFileType
GetTempPathA
advapi32
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
shell32
SHCreateDirectoryExW
ws2_32
inet_ntoa
WSACleanup
inet_addr
WSAStartup
gethostbyname
winhttp
WinHttpQueryDataAvailable
WinHttpAddRequestHeaders
WinHttpReceiveResponse
WinHttpOpen
WinHttpQueryHeaders
WinHttpReadData
WinHttpConnect
WinHttpSetOption
WinHttpCloseHandle
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpOpenRequest
dbghelp
MakeSureDirectoryPathExists
shlwapi
PathFileExistsA
PathRemoveExtensionA
rpcrt4
UuidCreateSequential
iphlpapi
GetAdaptersInfo
SendARP
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ