D:\Projects\MyCheatPro.diablo4\obj\Win32\Launcher\Release\Launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ceb1c326fd2e9ddcf2bba45ef9c0aba22d177e9d4d660c18e1713894b7be6d58.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ceb1c326fd2e9ddcf2bba45ef9c0aba22d177e9d4d660c18e1713894b7be6d58.exe
Resource
win10v2004-20240226-en
General
-
Target
ceb1c326fd2e9ddcf2bba45ef9c0aba22d177e9d4d660c18e1713894b7be6d58
-
Size
211KB
-
MD5
d6d5d400dcc869dfb224bb5536af9a46
-
SHA1
87663b9a7190b6d4d21a275fb47ccb753bca3760
-
SHA256
ceb1c326fd2e9ddcf2bba45ef9c0aba22d177e9d4d660c18e1713894b7be6d58
-
SHA512
f9c8ef5ca77b2339f17975382d4468e26dfa20682678b74416aa8739ceda6753b8f81250144fda8f9fe916e99ad7f11e583ae9cee788464973801e96dc884aa8
-
SSDEEP
6144:Qk0yXpGF/p/uwONct43j92UrF/p/uwONct43j92Uo:QSXE9pGHNu4B2Ur9pGHNu4B2Uo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ceb1c326fd2e9ddcf2bba45ef9c0aba22d177e9d4d660c18e1713894b7be6d58
Files
-
ceb1c326fd2e9ddcf2bba45ef9c0aba22d177e9d4d660c18e1713894b7be6d58.exe windows:6 windows x86 arch:x86
da73a871dd17096bab61ed40e14fda0c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
GetModuleHandleA
OpenProcess
GetExitCodeThread
LoadLibraryA
lstrcpyA
CloseHandle
HeapAlloc
GetProcAddress
VirtualAllocEx
GetProcessHeap
FreeLibrary
CreateRemoteThread
VirtualFreeEx
GetModuleFileNameA
Process32First
GetCurrentProcess
TerminateProcess
FindNextFileA
FindClose
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
CopyFileA
GetLastError
UpdateProcThreadAttribute
GetSystemDirectoryA
Process32Next
DeleteProcThreadAttributeList
WideCharToMultiByte
WriteConsoleW
HeapFree
InitializeProcThreadAttributeList
WriteProcessMemory
HeapReAlloc
HeapSize
CreateFileW
GetConsoleCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetACP
SetFilePointerEx
GetConsoleMode
GetFileType
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
LCMapStringW
FlushFileBuffers
DecodePointer
user32
wsprintfA
advapi32
CreateProcessAsUserA
shlwapi
StrStrIA
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ