e:\tags\appsInstall\apps\bin\OutPut\Nox\NoxPack.pdb
Static task
static1
Behavioral task
behavioral1
Sample
OptiNox V1.0.exe
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
OptiNox V1.0.exe
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
OptiNox V1.0.exe
Resource
android-x64-arm64-20240514-en
General
-
Target
OptiNox V1.0.exe
-
Size
262.9MB
-
MD5
665dbd7df8abe78ef861dc1a44bfe9d1
-
SHA1
2aca5cf0056a807a475a1a15692da653f391b340
-
SHA256
d478a8f15d8458a885280d56965219cb8ca8898e92327f3e11b78ba98c7b2923
-
SHA512
934f6204dd9b4027ef791831aab018fdafa2d7f802afbfeaef01c896e1d350e3f120aabf8f0431575ece702a78c7cca1b3a92de5734920b9b95cc28ade34d894
-
SSDEEP
3145728:z58E7mNFCUN7hgpUzg5R9JIEnx5AevCYAaPBYva0DSSbr8/CeM7JA05pr4JSrqvM:zisqrg5vJdzDTuSqK01D5WJ3LfEB/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource OptiNox V1.0.exe
Files
-
OptiNox V1.0.exe.exe windows:5 windows x86 arch:x86
2280a79577cdbc507d5c34798ceb6f0b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTickCount
GlobalFree
GlobalAlloc
GlobalUnlock
GlobalLock
GetModuleFileNameW
GetCurrentProcessId
CreateThread
MoveFileExW
InitializeCriticalSection
DeleteCriticalSection
SetFilePointer
GetFileType
DuplicateHandle
DosDateTimeToFileTime
SetFileTime
CreateEventW
SetEvent
GetPrivateProfileStringA
ExitProcess
LoadLibraryExW
GetCommandLineW
GetSystemDefaultLangID
lstrcmpW
DebugBreak
OutputDebugStringW
GetUserDefaultLCID
PostQueuedCompletionStatus
SetEndOfFile
QueueUserWorkItem
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
GetModuleHandleExA
InterlockedExchange
CreateIoCompletionPort
GetQueuedCompletionStatus
InterlockedExchangeAdd
GetLocalTime
CreateDirectoryA
DeleteFileA
SetFileAttributesA
CompareFileTime
GetFileTime
CreateFileA
GetModuleFileNameA
GetEnvironmentVariableA
lstrlenA
GetLastError
SetEnvironmentVariableA
CreateProcessA
GetExitCodeProcess
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetStringTypeA
GetLocaleInfoA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetFileAttributesA
InitializeCriticalSectionAndSpinCount
SetHandleCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetModuleHandleA
HeapCreate
GetStdHandle
HeapSize
GetStringTypeW
LCMapStringW
LCMapStringA
CompareStringW
GetCPInfo
CompareStringA
GetStartupInfoA
GetCommandLineA
ExitThread
GetFileAttributesW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapReAlloc
GetSystemTimeAsFileTime
RtlUnwind
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
ReadFile
GetTempPathW
GetTempFileNameW
InterlockedIncrement
LocalAlloc
LocalFree
GetModuleHandleW
GetCurrentDirectoryW
SetCurrentDirectoryW
FindResourceW
LoadResource
LockResource
CreateFileW
SizeofResource
WriteFile
FreeResource
CreateToolhelp32Snapshot
Process32FirstW
lstrcpyW
lstrlenW
lstrcmpiW
Process32NextW
CloseHandle
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
CopyFileW
RaiseException
SetFileAttributesW
MultiByteToWideChar
WideCharToMultiByte
GetVersionExW
SystemTimeToFileTime
GetSystemInfo
GlobalMemoryStatusEx
GetDiskFreeSpaceExW
GetVolumeInformationW
WaitForSingleObject
CreateProcessW
Sleep
CreateDirectoryW
DeleteFileW
LoadLibraryW
GetProcAddress
SetLastError
InterlockedDecrement
FreeLibrary
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
user32
GetClientRect
SetWindowPos
GetWindowLongW
SetWindowLongW
IsWindow
PostMessageW
DrawIconEx
DrawTextW
GetKeyState
wvsprintfW
GetFocus
UpdateWindow
EnableWindow
SetTimer
DrawIcon
GetWindowTextLengthW
RegisterClipboardFormatW
WaitMessage
UnregisterClassA
KillTimer
SetFocus
DestroyWindow
CallWindowProcW
DefWindowProcW
GetWindowRect
ShowWindow
IsIconic
IsZoomed
ScreenToClient
GetDC
EnumDisplaySettingsW
GetClassInfoExW
LoadCursorW
ReleaseDC
PeekMessageW
RegisterClassExW
CreateWindowExW
InvalidateRect
SendMessageW
MapWindowPoints
GetMonitorInfoW
MonitorFromWindow
GetWindow
GetParent
SystemParametersInfoW
SetClassLongW
LoadImageW
GetSystemMetrics
OffsetRect
SetWindowRgn
GetMessagePos
PostQuitMessage
BeginPaint
EndPaint
SetForegroundWindow
SendMessageTimeoutW
DispatchMessageW
TranslateMessage
AttachThreadInput
GetWindowThreadProcessId
GetForegroundWindow
LoadStringW
FillRect
CopyRect
GetQueueStatus
MsgWaitForMultipleObjectsEx
FindWindowW
CharNextW
RegisterWindowMessageW
TrackMouseEvent
SetWindowTextW
GetWindowTextW
UnregisterClassW
gdi32
Rectangle
RoundRect
SetTextColor
GetObjectA
SetBkColor
CreateCompatibleBitmap
SetWindowOrgEx
GetObjectW
DeleteObject
DeleteDC
CreateCompatibleDC
CombineRgn
CreateRectRgn
CreateRoundRectRgn
CreateFontW
BitBlt
GetTextExtentPoint32W
SetBkMode
StretchBlt
SelectObject
CreatePen
CreateSolidBrush
SetViewportOrgEx
MoveToEx
LineTo
advapi32
GetLengthSid
AllocateAndInitializeSid
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserW
OpenProcessToken
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
GetNamedSecurityInfoW
SetEntriesInAclW
SetNamedSecurityInfoW
CreateWellKnownSid
FreeSid
shell32
SHGetPathFromIDListW
CommandLineToArgvW
SHFileOperationW
SHGetSpecialFolderPathW
SHBrowseForFolderW
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteW
ole32
CoInitializeEx
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CreateStreamOnHGlobal
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
VarUI4FromStr
SysFreeString
SysAllocString
shlwapi
PathAddBackslashW
PathFileExistsA
PathIsDirectoryA
PathFindFileNameA
PathRemoveFileSpecA
PathCombineA
PathAppendA
PathIsRootW
PathIsDirectoryEmptyW
PathFileExistsW
PathIsDirectoryW
comctl32
InitCommonControlsEx
msimg32
TransparentBlt
AlphaBlend
opengl32
glGetString
gdiplus
GdipClonePath
GdipCloneBrush
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDrawString
GdipFillPath
GdipFillRectangleI
GdipDrawPath
GdipDrawRectangleI
GdipDrawLineI
GdipSetTextRenderingHint
GdipReleaseDC
GdipAddPathArcI
GdipAddPathLineI
GdipSetStringFormatTrimming
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipCreateTexture2I
GdipSetImageAttributesColorKeys
GdipDeleteFont
GdipDeletePath
GdipCreatePath
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDeletePen
GdipCreatePen1
GdipTranslateTextureTransform
GdipDeleteBrush
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipDrawImageRectRectI
GdipCreateFromHDC
GdipGetImageHeight
GdipGetImageWidth
GdipDeleteGraphics
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipDisposeImage
GdipAlloc
GdipFree
GdipCreateSolidFill
netapi32
Netbios
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
wininet
InternetReadFile
InternetOpenUrlA
HttpSendRequestA
HttpOpenRequestW
InternetConnectW
InternetCloseHandle
InternetSetOptionW
InternetOpenA
HttpQueryInfoW
winmm
timeGetTime
Sections
.text Size: 407KB - Virtual size: 406KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 262.4MB - Virtual size: 262.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ