e:\Projects\Casual\SpaceTank_rus\Link\SpaceTank.pdb
Static task
static1
Behavioral task
behavioral1
Sample
53097e5d0173b5817592020671910fb154374d26fe7a631fe6bbf47e568c7b60.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
53097e5d0173b5817592020671910fb154374d26fe7a631fe6bbf47e568c7b60.exe
Resource
win10v2004-20240412-en
General
-
Target
53097e5d0173b5817592020671910fb154374d26fe7a631fe6bbf47e568c7b60
-
Size
980KB
-
MD5
4b3e3f5ccf5fffddcd60e4a78924ffa8
-
SHA1
71a4b185801ed74006240c3dece5d84c47ae39ef
-
SHA256
53097e5d0173b5817592020671910fb154374d26fe7a631fe6bbf47e568c7b60
-
SHA512
68c585ea467eb5465d9f90f02127e5810f9694a353316b2228cfbbd4a7f8d0d0193a03786979c459d848cdc34b3703e2d0a701fd578c1ffdfcad39a4fb123c8a
-
SSDEEP
24576:1VvgLobHzdGZXG4B7735+Ux2nogS6ElEkOmRC:wo4P6ouKEkOmRC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53097e5d0173b5817592020671910fb154374d26fe7a631fe6bbf47e568c7b60
Files
-
53097e5d0173b5817592020671910fb154374d26fe7a631fe6bbf47e568c7b60.exe windows:4 windows x86 arch:x86
e114a820bae08d4ddde4ad265c3acd68
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
d3d8
Direct3DCreate8
dinput8
DirectInput8Create
kernel32
CreateFileW
CloseHandle
UnmapViewOfFile
InterlockedIncrement
InterlockedDecrement
ReadFile
HeapFree
GetLocaleInfoW
FlushFileBuffers
IsBadCodePtr
IsBadReadPtr
CreateFileA
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetOEMCP
GetACP
SetEndOfFile
SetStdHandle
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteFile
GetVersionExA
IsProcessorFeaturePresent
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
GetProcAddress
GetLastError
MulDiv
GetModuleHandleA
QueryPerformanceCounter
QueryPerformanceFrequency
CreateDirectoryA
Sleep
UnhandledExceptionFilter
GetStdHandle
IsBadWritePtr
VirtualAlloc
VirtualFree
VirtualQuery
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
ExitProcess
GetStartupInfoA
GetCommandLineA
SetFilePointer
GetFileType
TerminateProcess
GetCurrentProcess
HeapAlloc
LCMapStringA
LCMapStringW
GetCPInfo
HeapReAlloc
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapSize
HeapDestroy
HeapCreate
user32
UpdateWindow
SetWindowPos
TranslateMessage
GetWindowRect
GetCursorPos
GetClientRect
MessageBoxA
LoadStringA
FindWindowA
PeekMessageA
GetMessageA
GetSystemMetrics
DispatchMessageA
GetActiveWindow
WaitMessage
LoadIconA
LoadCursorA
RegisterClassExA
PostQuitMessage
DestroyWindow
DefWindowProcA
SetCursor
CreateWindowExA
ShowWindow
gdi32
CreateCompatibleDC
CreateDIBSection
SetMapMode
GetDeviceCaps
CreateFontA
SelectObject
SetTextColor
SetBkColor
SetTextAlign
GetTextExtentPoint32A
ExtTextOutA
DeleteObject
DeleteDC
advapi32
RegQueryValueExA
RegOpenKeyA
RegCloseKey
shell32
SHGetFolderPathA
ole32
CoInitialize
CoCreateInstance
dsound
ord11
Sections
.text Size: 708KB - Virtual size: 704KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ