C:\Users\grego\Downloads\Nova_External-main\Nova_External-main\x64\Debug\NovaHack.pdb
Static task
static1
Behavioral task
behavioral1
Sample
NovaHack.exe
Resource
win10v2004-20240226-en
General
-
Target
NovaHack.exe
-
Size
1.9MB
-
MD5
079b32f1819665c79f25aa44de4b5cc5
-
SHA1
007699a8d608fa504f536bb021cab9734ba9cc75
-
SHA256
50b46906e2dd54ee4b0e3cc11768b056d2a6d3558f3f8b3b1fbfe843d74f48ad
-
SHA512
e112610ec10774efae4e552fe17a393bacee244d66dfbdf15edb94c6ece8eb369134ded8e2bc84fa8f209e18e443107e6714273ffa4f344c8c3c4121df90a8f5
-
SSDEEP
12288:3pzw/300NIoMss7YldRRwDxOVlTMN29egw3b2+BJjVud5DEYAqV9BYISrUGVfd6b:IEHsfMxIlJS2EINSrUkfd989tndT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NovaHack.exe
Files
-
NovaHack.exe.exe windows:6 windows x64 arch:x64
e11590398178555a5f08c447fe861ee4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
VerSetConditionMask
QueryPerformanceCounter
QueryPerformanceFrequency
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
InitializeSListHead
Module32FirstW
GetCurrentProcessId
RaiseException
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetCurrentThreadId
VirtualQuery
Module32NextW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
CloseHandle
ReadProcessMemory
GetSystemTimeAsFileTime
WriteProcessMemory
user32
RegisterClassExA
DefWindowProcA
DestroyWindow
ClientToScreen
LoadIconW
GetWindow
GetDesktopWindow
SetWindowLongW
GetWindowRect
UpdateWindow
SetWindowPos
SetLayeredWindowAttributes
CreateWindowExA
PeekMessageW
DispatchMessageW
TranslateMessage
SetProcessDPIAware
MonitorFromWindow
ShowWindow
GetAsyncKeyState
GetSystemMetrics
OpenClipboard
CloseClipboard
SetClipboardData
GetClipboardData
GetCursorPos
SetCursor
SetCursorPos
EmptyClipboard
GetClientRect
ReleaseDC
GetDC
GetForegroundWindow
IsWindowUnicode
ReleaseCapture
SetCapture
GetCapture
GetKeyState
GetMessageExtraInfo
TrackMouseEvent
LoadCursorW
ScreenToClient
gdi32
CreateRectRgn
GetDeviceCaps
DeleteObject
msvcp140d
?_W_Getmonths@_Locinfo@std@@QEBAPEBGXZ
?_W_Getdays@_Locinfo@std@@QEBAPEBGXZ
?_Getmonths@_Locinfo@std@@QEBAPEBDXZ
?_Getdays@_Locinfo@std@@QEBAPEBDXZ
?_Getcvt@_Locinfo@std@@QEBA?AU_Cvtvec@@XZ
_Mbrtowc
?_Xbad_alloc@std@@YAXXZ
?_Xlength_error@std@@YAXPEBD@Z
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
imm32
ImmReleaseContext
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmGetContext
dwmapi
DwmExtendFrameIntoClientArea
DwmGetColorizationColor
DwmEnableBlurBehindWindow
DwmIsCompositionEnabled
d3d9
Direct3DCreate9Ex
vcruntime140d
__vcrt_LoadLibraryExW
__C_specific_handler_noexcept
__current_exception_context
__current_exception
__C_specific_handler
strchr
strstr
__vcrt_GetModuleHandleW
memcmp
memchr
memmove
memcpy
_CxxThrowException
__std_exception_destroy
__std_exception_copy
memset
__vcrt_GetModuleFileNameW
__std_type_info_destroy_list
vcruntime140_1d
__CxxFrameHandler4
ucrtbased
free
malloc
qsort
fabs
fmodf
strcpy
strncmp
toupper
floorf
ceilf
atof
log
pow
logf
wcslen
system
_calloc_dbg
_callnewh
_free_dbg
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
_cexit
_CrtDbgReportW
_seh_filter_exe
_set_app_type
__setusermatherr
__stdio_common_vsprintf
_initterm
_initterm_e
exit
_exit
_set_fmode
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
terminate
strcpy_s
strcat_s
__stdio_common_vsprintf_s
_wmakepath_s
_wsplitpath_s
wcscpy_s
__acrt_iob_func
_wassert
strncpy
strlen
strcmp
_wcsicmp
powf
tanf
sinf
cosf
sqrtf
atan2f
acosf
_CrtDbgReport
_invalid_parameter
fwrite
ftell
fseek
fread
fflush
__stdio_common_vsscanf
fclose
_get_initial_narrow_environment
_wfopen
__stdio_common_vfprintf
Sections
.textbss Size: - Virtual size: 658KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 387KB - Virtual size: 386KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 113KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 373B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ