D:\work\stcode\GameLauncher\BrowserLauncher\Bin\BrowserLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
adb394ce1bd47c77b12447f43dda6439.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adb394ce1bd47c77b12447f43dda6439.exe
Resource
win10v2004-20240226-en
General
-
Target
adb394ce1bd47c77b12447f43dda6439
-
Size
286KB
-
MD5
adb394ce1bd47c77b12447f43dda6439
-
SHA1
d775846e0f7cd2927608a6bf5fba01e6b111e132
-
SHA256
d5b9e0a8fc37898673615a9f0c2ec0530cda28f049442a1175a105721b8afce6
-
SHA512
50bf58aa64c2b3bb3ac8361e943521a6a316dadd108323051dc58a6970045ff453dc2526588d1ede6ec0f434699b88e18a453a4d9ee41e6b931f7226914217bf
-
SSDEEP
6144:orJ04Jb7OAvd7k/oxQWMsCGFwjOgpHZGmAOvyFAasfEa:o+Wb7t17k/GQWMsCcngBZGmhaQEa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adb394ce1bd47c77b12447f43dda6439
Files
-
adb394ce1bd47c77b12447f43dda6439.exe windows:6 windows x86 arch:x86
0851697eb18d5ba01115847ac73fe4b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
GetLastError
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
CreateFileW
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
OutputDebugStringW
SetEndOfFile
CreateMutexA
ReleaseMutex
Sleep
DeleteFileA
DeleteFileW
CreateThread
GetLogicalDrives
DecodePointer
GetModuleFileNameA
ReadFile
ExpandEnvironmentStringsA
CloseHandle
CreateFileA
WriteConsoleW
HeapSize
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
GetProcessHeap
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
HeapReAlloc
GetConsoleMode
GetStringTypeW
LCMapStringW
CompareStringW
GetDriveTypeA
GetFileSizeEx
WriteFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
Process32First
Process32Next
GetComputerNameA
GlobalAlloc
GlobalFree
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcmpiA
GetProcessTimes
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
EncodePointer
RaiseException
SetLastError
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
GetFileType
GetTempPathA
advapi32
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
shell32
SHCreateDirectoryExW
ws2_32
inet_ntoa
WSACleanup
inet_addr
WSAStartup
gethostbyname
winhttp
WinHttpQueryDataAvailable
WinHttpAddRequestHeaders
WinHttpReceiveResponse
WinHttpOpen
WinHttpQueryHeaders
WinHttpReadData
WinHttpConnect
WinHttpSetOption
WinHttpCloseHandle
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpOpenRequest
dbghelp
MakeSureDirectoryPathExists
shlwapi
PathFileExistsA
PathRemoveExtensionA
rpcrt4
UuidCreateSequential
iphlpapi
GetAdaptersInfo
SendARP
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ