D:\Work\GF\SRCS\Game\TW_based\play\GrandFantasia.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bf70f63db1c87d2eb4934659e19849f6bc7b27ddb301ae6281a733adcbdf8dde.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf70f63db1c87d2eb4934659e19849f6bc7b27ddb301ae6281a733adcbdf8dde.exe
Resource
win10v2004-20240412-en
General
-
Target
bf70f63db1c87d2eb4934659e19849f6bc7b27ddb301ae6281a733adcbdf8dde
-
Size
10.1MB
-
MD5
6fff10e05633daf6f31bf5764162c095
-
SHA1
c9165b63d72288086b67c608ce2d3e81f6c18816
-
SHA256
bf70f63db1c87d2eb4934659e19849f6bc7b27ddb301ae6281a733adcbdf8dde
-
SHA512
b1627bd16e3dc42cdba09adac2540dab56be71e973a3d846b98dd4724e3e022d116e138c7354fbe82fd1c5f2bce6662eabf464e65a474ccb1d786c9fff047af3
-
SSDEEP
196608:5Zljx+rxTppGFxlJldwdA2DvYn0qsxQrWdcnEEMZcmq1Pc9Rp:ET/Gtd06WdcnEEMZvCPCR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf70f63db1c87d2eb4934659e19849f6bc7b27ddb301ae6281a733adcbdf8dde
Files
-
bf70f63db1c87d2eb4934659e19849f6bc7b27ddb301ae6281a733adcbdf8dde.exe windows:5 windows x86 arch:x86
1b382667df025fc1e09dc69dfd98b075
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentDirectoryW
SetStdHandle
ReadConsoleW
SetFilePointerEx
FindFirstFileExA
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetProcessHeap
OutputDebugStringA
WriteConsoleW
FlushFileBuffers
GetTimeZoneInformation
GetFileType
GetDriveTypeW
CreateFileW
RtlUnwind
SetLastError
LoadLibraryExW
FreeLibrary
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
RaiseException
EncodePointer
TerminateProcess
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
DeleteFileW
GetStringTypeW
GetCurrentThread
OpenProcess
ReleaseMutex
CreateMutexA
OpenMutexA
GetCurrentDirectoryA
Process32First
Process32Next
IsDBCSLeadByteEx
TerminateThread
GetExitCodeThread
GetSystemTime
HeapAlloc
HeapFree
GetSystemDirectoryA
IsBadReadPtr
LocalFree
GetVersionExA
GetFileSize
GetFileAttributesExW
MoveFileExW
lstrcmpiA
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetConsoleMode
GetConsoleCP
RemoveDirectoryA
GlobalFree
VerifyVersionInfoA
GlobalMemoryStatusEx
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
MulDiv
ReadProcessMemory
HeapSize
IsDBCSLeadByte
GlobalUnlock
GlobalLock
GlobalAlloc
GetTickCount
GetACP
GetStdHandle
IsProcessorFeaturePresent
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
QueryDosDeviceA
SetProcessWorkingSetSize
VirtualProtect
DeleteFileA
ResetEvent
SetEvent
GetFileAttributesA
CreateDirectoryA
ResumeThread
SuspendThread
SetThreadPriority
SetThreadAffinityMask
CreateThread
GetCurrentProcess
GetProcessAffinityMask
TlsFree
GetModuleHandleA
GetModuleFileNameA
QueryPerformanceFrequency
QueryPerformanceCounter
LoadLibraryA
GetProcAddress
CreateSemaphoreA
WaitForSingleObject
ReleaseSemaphore
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualQuery
TlsGetValue
SwitchToThread
GetSystemInfo
TlsAlloc
FindClose
FindNextFileA
InterlockedCompareExchange
FindFirstFileA
InterlockedExchange
TlsSetValue
VirtualAlloc
VirtualFree
Sleep
CloseHandle
CreateFileA
GetLastError
SetEndOfFile
WriteFile
HeapUnlock
WideCharToMultiByte
MultiByteToWideChar
ReadFile
GetModuleHandleExW
ExitProcess
GetFullPathNameA
GetFullPathNameW
FileTimeToSystemTime
WriteProcessMemory
FormatMessageA
GetEnvironmentVariableA
GlobalMemoryStatus
GetProcessHeaps
HeapWalk
GetCurrentThreadId
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetLocalTime
HeapLock
user32
SetTimer
KillTimer
SendMessageA
GetLastActivePopup
GetActiveWindow
LoadIconA
LoadCursorA
GetWindowThreadProcessId
FindWindowA
SetClassLongA
SetWindowLongA
GetWindowLongA
AdjustWindowRectEx
GetWindowRect
UpdateWindow
GetSystemMetrics
TranslateAcceleratorA
SetFocus
SetWindowPos
SetCursor
MessageBoxExA
MessageBoxExW
DrawTextA
GetAsyncKeyState
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
PostMessageA
SetRect
PtInRect
RegisterClassExA
EnumDisplaySettingsA
IsWindow
GetClipboardData
GetKeyState
GetClientRect
ClientToScreen
MoveWindow
SetWindowTextA
ChangeDisplaySettingsA
SystemParametersInfoA
GetCursorPos
ScreenToClient
GetDC
ReleaseDC
ShowWindow
DestroyWindow
CreateWindowExA
UnregisterClassA
RegisterClassA
PostQuitMessage
DefWindowProcA
PeekMessageA
DispatchMessageA
TranslateMessage
GetParent
GetProcessWindowStation
GetUserObjectInformationW
GetDesktopWindow
MessageBoxA
wsprintfA
advapi32
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
SystemFunction036
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegOpenKeyExA
GetUserNameA
SetEntriesInAclA
GetSecurityInfo
SetSecurityInfo
RegCloseKey
alaudio
alGetSource3f
alGetSourcei
alSourceRewind
alGetSourcef
alSourcef
alSourcei
alIsSource
alSourcePause
alSourceStop
alDeleteSources
alcDestroyContext
alcCloseDevice
alGetError
alcOpenDevice
alcCreateContext
alcMakeContextCurrent
alcGetError
alDistanceModel
ord403
ord400
ord402
alGetEnumValue
ord401
ord602
ord601
ord603
ord600
ord604
ord205
ord202
ord203
ord201
ord200
ord204
alDeleteBuffers
alBufferData
alGenBuffers
alSource3f
alSourceQueueBuffers
alGenSources
alSourcePlay
alGetListenerfv
ord502
ord144
ord145
ord146
ord147
ord148
ord153
ord152
ord143
ord150
ord151
alListenerfv
alListener3f
alGetListener3f
ord406
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
dinput8
DirectInput8Create
gdi32
AddFontResourceA
CreateFontIndirectA
CreateDIBSection
SetBkMode
SelectObject
DeleteDC
CreateCompatibleDC
CreateSolidBrush
GetStockObject
SetTextColor
GetTextExtentPoint32A
DeleteObject
GdiFlush
RemoveFontResourceA
shell32
SHFileOperationA
ShellExecuteA
psapi
GetProcessMemoryInfo
imm32
ImmGetContext
ImmReleaseContext
ImmAssociateContext
ImmSetOpenStatus
ImmGetOpenStatus
ImmSetStatusWindowPos
ImmSetCompositionWindow
winmm
timeGetTime
waveOutClose
waveOutReset
waveOutUnprepareHeader
waveOutWrite
waveOutPrepareHeader
waveOutOpen
iphlpapi
GetAdaptersInfo
ws2_32
inet_addr
inet_ntoa
gethostbyname
gethostname
WSACleanup
WSAStartup
closesocket
htons
setsockopt
shutdown
WSAGetLastError
WSAAsyncSelect
WSAConnect
WSARecv
WSASend
WSASocketA
Exports
Exports
AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
Sections
.text Size: 8.5MB - Virtual size: 8.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 197KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 37B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 471KB - Virtual size: 471KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ