C:\Launcher\Launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
299b4ff544bf4c37ed4bb167c6dd23bc6b9dc4f4d5399332891d9463fab25bab.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
299b4ff544bf4c37ed4bb167c6dd23bc6b9dc4f4d5399332891d9463fab25bab.exe
Resource
win10v2004-20240508-en
General
-
Target
299b4ff544bf4c37ed4bb167c6dd23bc6b9dc4f4d5399332891d9463fab25bab
-
Size
8.9MB
-
MD5
f1902401b856ce9a57b4f87c78682fab
-
SHA1
6cdbb92ba260bccb9d6c8e7c26affd87c13f04ef
-
SHA256
299b4ff544bf4c37ed4bb167c6dd23bc6b9dc4f4d5399332891d9463fab25bab
-
SHA512
6b9c90908d034600b8310a55bf424b3f927f03b8a408a12c3a28c1ed53a23c678226f83aa6a07ed96920cb745a3acd974aaa668b827876ded5501d4da734f163
-
SSDEEP
196608:hQuMm/h78Sb7q3LKv+8hWpdPh3ipC+8hWpdFwx6v+8hWpdFwx6v+8hWpxeskGkuD:h1Z3b2+ZipkMsZsZbGku7B/5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 299b4ff544bf4c37ed4bb167c6dd23bc6b9dc4f4d5399332891d9463fab25bab
Files
-
299b4ff544bf4c37ed4bb167c6dd23bc6b9dc4f4d5399332891d9463fab25bab.exe windows:6 windows x86 arch:x86
a7af2c6ba02d3d9ef2beefd55267bafd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
d3dx9_43
D3DXGetImageInfoFromFileInMemory
D3DXSaveSurfaceToFileA
D3DXCreateFontA
D3DXCreateVolumeTextureFromFileInMemoryEx
D3DXCreateCubeTextureFromFileInMemoryEx
D3DXCreateTextureFromFileInMemoryEx
D3DXCreateTextureFromFileInMemory
d3d9
Direct3DCreate9
kernel32
GetFileAttributesW
GetFullPathNameW
SetFileAttributesW
SetFilePointer
GetModuleFileNameW
GetModuleHandleA
MoveFileW
GetCurrentThreadId
CompareFileTime
GetSystemTime
GetLocalTime
FileTimeToSystemTime
SystemTimeToFileTime
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetTickCount
FormatMessageA
GetComputerNameW
GetACP
GetOEMCP
QueryPerformanceCounter
QueryPerformanceFrequency
GetFileSize
ReadFile
SetEndOfFile
WriteFile
CreateThread
LoadLibraryW
FreeLibrary
ReleaseSemaphore
CreateSemaphoreA
SetLastError
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
GetStringTypeW
ReadConsoleW
FlushFileBuffers
SetFilePointerEx
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetConsoleMode
GetConsoleCP
GetCPInfo
IsValidCodePage
FindClose
CreateFileW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
GetStartupInfoW
GetStdHandle
GetFileAttributesExW
AreFileApisANSI
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
GetModuleHandleExW
RtlUnwind
GetCommandLineA
IsProcessorFeaturePresent
LoadLibraryExW
CreateDirectoryW
GetCurrentDirectoryW
InitializeCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
MoveFileA
DeleteFileA
SetConsoleTitleA
AllocConsole
Sleep
GlobalAlloc
GlobalUnlock
GlobalLock
GetCurrentProcess
TerminateProcess
GetCurrentDirectoryA
GetFullPathNameA
CreateEventA
SetEvent
OutputDebugStringA
OpenEventA
LeaveCriticalSection
EnterCriticalSection
TerminateThread
WaitForSingleObject
DeviceIoControl
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
ExitThread
EncodePointer
CreateFileA
CloseHandle
DecodePointer
DeleteFileW
VirtualAlloc
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
Module32Next
Module32First
GetCurrentProcessId
SetUnhandledExceptionFilter
CreateFileMappingA
UnmapViewOfFile
MulDiv
GetCurrentThread
TryEnterCriticalSection
DuplicateHandle
MapViewOfFile
GetSystemInfo
SetFileAttributesA
WideCharToMultiByte
IsDebuggerPresent
Process32Next
Process32First
RaiseException
GetVersionExA
GetProcAddress
GlobalMemoryStatusEx
CopyFileA
GetModuleFileNameA
MultiByteToWideChar
LoadLibraryA
CreateToolhelp32Snapshot
ReadProcessMemory
OpenProcess
ExitProcess
GetDateFormatW
GetTimeFormatW
GetModuleHandleW
CompareStringW
LCMapStringW
WriteConsoleW
OutputDebugStringW
SetEnvironmentVariableA
user32
GetClientRect
ClientToScreen
GetMessageW
ShowCursor
PeekMessageW
PostQuitMessage
RegisterClassA
CreateWindowExA
SendMessageA
EndDialog
SetTimer
KillTimer
GetActiveWindow
EnableWindow
SetFocus
DialogBoxParamA
MessageBoxA
LoadIconA
LoadCursorA
LoadStringW
SetRect
AdjustWindowRect
GetWindowLongA
SetWindowPos
ClipCursor
ReleaseCapture
GetCursorPos
GetWindowRect
SetCapture
DefWindowProcA
SetWindowLongA
SetWindowTextA
FindWindowExA
ShowWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetCaretBlinkTime
GetFocus
UpdateWindow
BeginPaint
EndPaint
InvalidateRect
GetDlgItem
SwitchToThisWindow
GetAsyncKeyState
CloseClipboard
GetClipboardData
OpenClipboard
GetKeyState
gdi32
CreateDIBSection
SetTextAlign
SetTextColor
SetMapMode
SetBkColor
SelectObject
MoveToEx
GetTextExtentPoint32A
DeleteObject
CreatePen
CreateFontA
CreateCompatibleDC
GetStockObject
LineTo
ExtTextOutA
DeleteDC
GetDeviceCaps
CreateICA
CreateSolidBrush
advapi32
CryptCreateHash
RegQueryValueExA
RegCreateKeyExW
RegSetValueExA
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
CryptGetProvParam
CryptGetUserKey
CryptSignHashA
CryptSetHashParam
CryptDestroyHash
RegOpenKeyExA
CryptExportKey
CryptDestroyKey
shell32
ShellExecuteA
SHGetFolderPathA
ole32
CoInitializeEx
CoCreateInstance
CoInitialize
oleaut32
SysFreeString
SysAllocString
iphlpapi
GetAdaptersInfo
vmprotectsdk32
VMProtectBeginUltra
VMProtectEnd
VMProtectBeginMutation
VMProtectDecryptStringW
dbghelp
MiniDumpWriteDump
MakeSureDirectoryPathExists
ws2_32
closesocket
connect
htons
inet_addr
inet_ntoa
recv
select
send
socket
gethostbyname
WSAGetLastError
bind
ioctlsocket
getsockname
getsockopt
ntohs
setsockopt
shutdown
WSAStartup
WSAIoctl
__WSAFDIsSet
dinput8
DirectInput8Create
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 841KB - Virtual size: 841KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 150KB - Virtual size: 836KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ