C:\Users\murde\Downloads\phobia\menu phobia\examples\example_win32_directx9\Release\example_win32_directx9.pdb
Static task
static1
Behavioral task
behavioral1
Sample
example_win32_directx9.exe
Resource
win10-20240404-en
General
-
Target
example_win32_directx9.exe
-
Size
783KB
-
MD5
9b8410fb2c328a7d153057991dac50f3
-
SHA1
c57ea6acc6f120a9943bd8768bcff6ee75d720f2
-
SHA256
47d41ca2f3fdb96a448ae4a4fe5a91b516b4568301fdda603d1015b728403a09
-
SHA512
8509c5e77dd2117c72a5c00b391ec7340a8e3a6929e10a8f917e15b19336d8c51228e734adb330648e07a261259cc482e6b06e75e388a461f95b9efb9ec4a77b
-
SSDEEP
12288:SdH12fIsOfCw148onUXWJDO5dsbg1gcgDVHKbr3LF8+t:yV2fInK0onyWJSny2FgDwXbz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource example_win32_directx9.exe
Files
-
example_win32_directx9.exe.exe windows:6 windows x64 arch:x64
223bbb24ba72429060a4f6c8406e9321
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
d3d9
Direct3DCreate9
kernel32
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
FreeLibrary
QueryPerformanceCounter
GetModuleHandleW
WideCharToMultiByte
MultiByteToWideChar
WakeAllConditionVariable
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
GlobalUnlock
GlobalLock
CreateThread
GlobalFree
GlobalAlloc
RtlCaptureContext
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTempPathA
InitializeSListHead
SleepConditionVariableSRW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
RtlLookupFunctionEntry
user32
ScreenToClient
GetCapture
GetKeyState
DefWindowProcW
CreateWindowExW
ClientToScreen
TrackMouseEvent
GetForegroundWindow
LoadCursorW
SetCapture
SetCursor
GetClientRect
GetSystemMetrics
UnregisterClassW
RegisterClassExW
ShowWindow
GetAsyncKeyState
DispatchMessageW
UpdateWindow
TranslateMessage
DestroyWindow
ReleaseCapture
SetCursorPos
GetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
PostQuitMessage
PeekMessageW
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
imm32
ImmSetCandidateWindow
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
ImmAssociateContextEx
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
d3dx9_43
D3DXCreateTextureFromFileInMemoryEx
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__current_exception
__current_exception_context
__C_specific_handler
__std_exception_destroy
_CxxThrowException
strstr
__std_terminate
__std_exception_copy
memset
memcmp
memcpy
memmove
memchr
api-ms-win-crt-stdio-l1-1-0
fflush
__acrt_iob_func
fwrite
ftell
fclose
_wfopen
__stdio_common_vsprintf
__p__commode
_set_fmode
fseek
fread
__stdio_common_vsscanf
__stdio_common_vfprintf
api-ms-win-crt-string-l1-1-0
strncpy
strcmp
strncmp
api-ms-win-crt-utility-l1-1-0
rand
qsort
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
_callnewh
malloc
api-ms-win-crt-runtime-l1-1-0
_cexit
_crt_atexit
_set_app_type
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_exit
_register_onexit_function
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
terminate
_wassert
_seh_filter_exe
api-ms-win-crt-math-l1-1-0
cosf
sqrtf
sinf
fmodf
ceilf
__setusermatherr
powf
acosf
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 286KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 409KB - Virtual size: 412KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ