D:\Work\Casual10\bin\the_game.pdb
Static task
static1
Behavioral task
behavioral1
Sample
631c6c33001648f39659270ec73504beb5321623d45b9c8fd64afb76cb74d4e6.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
631c6c33001648f39659270ec73504beb5321623d45b9c8fd64afb76cb74d4e6.exe
Resource
win10v2004-20240611-en
General
-
Target
631c6c33001648f39659270ec73504beb5321623d45b9c8fd64afb76cb74d4e6
-
Size
3.6MB
-
MD5
3a6de07963735667448b38f08d1ba69a
-
SHA1
d49c820f19fc98b55fe0e10e88b26aa3093ca4b4
-
SHA256
631c6c33001648f39659270ec73504beb5321623d45b9c8fd64afb76cb74d4e6
-
SHA512
66e130562ee4f8ecc0626754a6ef740076675400903481cf0fd3620bd8eb57b24621b33ef98c7f42d9f68edf3eabb31a464113ffcfb026682e92e73f5e1380c3
-
SSDEEP
98304:uOvFVXDZbalo/BKCD41VAWn0agXc8pG+NrDfQ:/bNVKCD413CXcat
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 631c6c33001648f39659270ec73504beb5321623d45b9c8fd64afb76cb74d4e6
Files
-
631c6c33001648f39659270ec73504beb5321623d45b9c8fd64afb76cb74d4e6.exe windows:5 windows x86 arch:x86
78dccca2a313e26f443ddafe2d82f4bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
openal32
alSourcefv
alGetError
alSourceQueueBuffers
alGetSourcei
alcSuspendContext
alcMakeContextCurrent
alBufferData
alcProcessContext
alSourcePause
alGetBufferi
alcGetError
alcGetString
alDeleteSources
alcDestroyContext
alGenBuffers
alSourcei
alSourcePlay
alSourcef
alGetString
alcOpenDevice
alcCreateContext
alGenSources
alSourceUnqueueBuffers
alDeleteBuffers
alGetSourcef
alcCloseDevice
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
GetProcessMemoryInfo
ws2_32
accept
closesocket
bind
htons
__WSAFDIsSet
send
connect
select
shutdown
WSAGetLastError
recv
listen
WSACleanup
socket
WSAStartup
gethostbyname
winmm
timeGetTime
timeEndPeriod
timeBeginPeriod
d3d9
Direct3DCreate9
kernel32
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
GetOEMCP
GetACP
IsValidCodePage
HeapSize
WriteFile
GetStdHandle
GetProcessHeap
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetCurrentProcessId
GetTimeFormatW
GetDateFormatW
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
GetCurrentDirectoryW
GetFullPathNameA
GetDriveTypeW
FormatMessageW
TlsAlloc
TerminateProcess
GetEnvironmentStringsW
CompareStringW
GetModuleHandleExW
SetEndOfFile
SetEnvironmentVariableA
GetFileAttributesExW
CreateFileW
WriteConsoleW
MoveFileExW
CreatePipe
GetExitCodeProcess
LoadLibraryExW
FlushFileBuffers
ReadConsoleW
SetFilePointerEx
OutputDebugStringW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
LoadLibraryA
GetModuleFileNameW
GetModuleHandleA
SetCurrentDirectoryW
CreateDirectoryW
GetLastError
CreateThread
SetThreadPriority
WaitForSingleObject
OpenProcess
CloseHandle
WinExec
FindFirstFileA
FindNextFileA
FindClose
ExitProcess
DeleteFileW
GetCurrentProcess
CreateEventA
SetEvent
ResetEvent
Sleep
CreateMutexA
ReleaseMutex
CreateSemaphoreA
ReleaseSemaphore
CreateFileMappingA
MapViewOfFile
OpenFileMappingA
FreeLibrary
GetTickCount
SetThreadExecutionState
GetProcAddress
GetModuleFileNameA
VirtualQuery
GetVersionExA
IsBadWritePtr
GetCurrentThread
MulDiv
GetCurrentThreadId
SetErrorMode
SetUnhandledExceptionFilter
FormatMessageA
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapFree
HeapAlloc
RtlUnwind
SetLastError
IsDebuggerPresent
IsProcessorFeaturePresent
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
ReadFile
SetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
AreFileApisANSI
GetTempPathA
DuplicateHandle
CreateProcessA
GetCPInfo
UnhandledExceptionFilter
FreeEnvironmentStringsW
user32
AdjustWindowRect
EnumDisplayDevicesA
GetMessageA
CreateWindowExA
RegisterClassA
GetKeyboardState
EnumDisplaySettingsA
MessageBoxA
GetSystemMetrics
SetCursor
LoadCursorA
FindWindowA
ShowWindow
GetForegroundWindow
GetCursorPos
ScreenToClient
ClientToScreen
SetCursorPos
SetWindowTextW
SendMessageA
SetWindowLongA
DestroyWindow
MoveWindow
GetWindowPlacement
DefWindowProcW
GetClientRect
BeginPaint
EndPaint
SetForegroundWindow
ReleaseCapture
SetCapture
WindowFromPoint
CreateWindowExW
wsprintfW
SystemParametersInfoA
GetActiveWindow
SetTimer
PeekMessageA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
PostMessageA
LoadIconA
RegisterClassW
SetFocus
DefWindowProcA
GetSysColorBrush
gdi32
CreateFontA
DeleteObject
shell32
SHGetFolderPathW
ShellExecuteA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CoCreateGuid
CoSetProxyBlanket
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 567KB - Virtual size: 567KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 21.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 400KB - Virtual size: 399KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ