D:\work\stcode\GameLauncher\BrowserLauncher\Bin\BrowserLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b5ff46cb4a4ec4d5f402c76b3b095218.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5ff46cb4a4ec4d5f402c76b3b095218.exe
Resource
win10v2004-20240226-en
General
-
Target
b5ff46cb4a4ec4d5f402c76b3b095218
-
Size
286KB
-
MD5
b5ff46cb4a4ec4d5f402c76b3b095218
-
SHA1
64ef07d69b449dc80c6468c234004ca99bb92177
-
SHA256
7b1ee998fa6c9def13c929ed4df689a07a8e4e249b8cef6d16dacdc95bdc6ac0
-
SHA512
322927a9ddf05edce2b060057ee707c0e0da06e6796d852bbad4b779d63f7ed32023ea1851b93faa3b1dac711b4dbb0ae2d253e18bda03d5c85be385e3796ab0
-
SSDEEP
6144:orJ04Jb7OAvd7k/oxQWMsCGFwjOgpHZGmAOvyFAasfEM:o+Wb7t17k/GQWMsCcngBZGmhaQEM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5ff46cb4a4ec4d5f402c76b3b095218
Files
-
b5ff46cb4a4ec4d5f402c76b3b095218.exe windows:6 windows x86 arch:x86
0851697eb18d5ba01115847ac73fe4b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
GetLastError
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
CreateFileW
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
OutputDebugStringW
SetEndOfFile
CreateMutexA
ReleaseMutex
Sleep
DeleteFileA
DeleteFileW
CreateThread
GetLogicalDrives
DecodePointer
GetModuleFileNameA
ReadFile
ExpandEnvironmentStringsA
CloseHandle
CreateFileA
WriteConsoleW
HeapSize
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
GetProcessHeap
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
HeapReAlloc
GetConsoleMode
GetStringTypeW
LCMapStringW
CompareStringW
GetDriveTypeA
GetFileSizeEx
WriteFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
Process32First
Process32Next
GetComputerNameA
GlobalAlloc
GlobalFree
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcmpiA
GetProcessTimes
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
EncodePointer
RaiseException
SetLastError
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
GetFileType
GetTempPathA
advapi32
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
shell32
SHCreateDirectoryExW
ws2_32
inet_ntoa
WSACleanup
inet_addr
WSAStartup
gethostbyname
winhttp
WinHttpQueryDataAvailable
WinHttpAddRequestHeaders
WinHttpReceiveResponse
WinHttpOpen
WinHttpQueryHeaders
WinHttpReadData
WinHttpConnect
WinHttpSetOption
WinHttpCloseHandle
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpOpenRequest
dbghelp
MakeSureDirectoryPathExists
shlwapi
PathFileExistsA
PathRemoveExtensionA
rpcrt4
UuidCreateSequential
iphlpapi
GetAdaptersInfo
SendARP
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ