D:\work\stcode\GameLauncher\BrowserLauncher\Bin\BrowserLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c9cd02223c2f8399e811c91e0186055f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c9cd02223c2f8399e811c91e0186055f.exe
Resource
win10v2004-20240226-en
General
-
Target
c9cd02223c2f8399e811c91e0186055f
-
Size
286KB
-
MD5
c9cd02223c2f8399e811c91e0186055f
-
SHA1
fb9a086049447c8ad17e3ea20d60b99e2fe910b9
-
SHA256
5863e4112f5218c702710f9980adb6b269bd3fb2bc7567b17823af168e7ad84b
-
SHA512
3141a09b9d4533f680188fdb7a069e4b480d3d9665ca4cf5d5c62bf772225deca928477d88d48d78e846315b0f4aeb0aa85d4650b6b7a1883458549f4928967b
-
SSDEEP
6144:orJ04Jb7OAvd7k/oxQWMsCGFwjOgpHZGmAOvyFAasfEI:o+Wb7t17k/GQWMsCcngBZGmhaQEI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c9cd02223c2f8399e811c91e0186055f
Files
-
c9cd02223c2f8399e811c91e0186055f.exe windows:6 windows x86 arch:x86
0851697eb18d5ba01115847ac73fe4b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
GetLastError
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
CreateFileW
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
OutputDebugStringW
SetEndOfFile
CreateMutexA
ReleaseMutex
Sleep
DeleteFileA
DeleteFileW
CreateThread
GetLogicalDrives
DecodePointer
GetModuleFileNameA
ReadFile
ExpandEnvironmentStringsA
CloseHandle
CreateFileA
WriteConsoleW
HeapSize
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
GetProcessHeap
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
HeapReAlloc
GetConsoleMode
GetStringTypeW
LCMapStringW
CompareStringW
GetDriveTypeA
GetFileSizeEx
WriteFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
Process32First
Process32Next
GetComputerNameA
GlobalAlloc
GlobalFree
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcmpiA
GetProcessTimes
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
EncodePointer
RaiseException
SetLastError
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
GetFileType
GetTempPathA
advapi32
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
shell32
SHCreateDirectoryExW
ws2_32
inet_ntoa
WSACleanup
inet_addr
WSAStartup
gethostbyname
winhttp
WinHttpQueryDataAvailable
WinHttpAddRequestHeaders
WinHttpReceiveResponse
WinHttpOpen
WinHttpQueryHeaders
WinHttpReadData
WinHttpConnect
WinHttpSetOption
WinHttpCloseHandle
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpOpenRequest
dbghelp
MakeSureDirectoryPathExists
shlwapi
PathFileExistsA
PathRemoveExtensionA
rpcrt4
UuidCreateSequential
iphlpapi
GetAdaptersInfo
SendARP
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ