D:\gmtest\Projects\GamePP_Electron_Version\Bin\Common.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4f09a68015ae1ec3f56aa5bf62efd752e4097534461fdc3a7d344ac581c10151.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4f09a68015ae1ec3f56aa5bf62efd752e4097534461fdc3a7d344ac581c10151.dll
Resource
win10v2004-20240508-en
General
-
Target
4f09a68015ae1ec3f56aa5bf62efd752e4097534461fdc3a7d344ac581c10151
-
Size
200KB
-
MD5
b5e67e5cb847d0ffe20d1d9e2169ec95
-
SHA1
be1c07267e32e7f86eb123386c1179e9c5d5114d
-
SHA256
4f09a68015ae1ec3f56aa5bf62efd752e4097534461fdc3a7d344ac581c10151
-
SHA512
8ae2c850364ed7f428fa595f72f9a46b878863cba0af9d071347cdca2500590ba5a1736610a702847da6a23bb28cc665e5ae3803ff59c1ce99bdc99a86b6c442
-
SSDEEP
6144:8d4apH+kDBBYxBuQO54wbeJZZZOF65nD:5SHz+BuQ84wbeJBOY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f09a68015ae1ec3f56aa5bf62efd752e4097534461fdc3a7d344ac581c10151
Files
-
4f09a68015ae1ec3f56aa5bf62efd752e4097534461fdc3a7d344ac581c10151.dll windows:5 windows x86 arch:x86
43b34c4ec0488ab54ed6c80573cdd374
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
lstrcpynW
CreateThread
LoadLibraryW
VirtualQuery
IsBadReadPtr
SetLastError
GetProcessTimes
OpenProcess
GetSystemTime
lstrcatW
lstrcpyW
QueryDosDeviceW
lstrcmpiW
GetLogicalDriveStringsW
GetCurrentThreadId
GetDiskFreeSpaceExA
CopyFileW
GetSystemDefaultLCID
ReadFile
ReadProcessMemory
WideCharToMultiByte
WaitForSingleObject
CreateProcessW
GetStartupInfoW
MoveFileExW
GetTempFileNameW
GetTempPathW
Process32NextW
TerminateProcess
Process32FirstW
CreateToolhelp32Snapshot
FindClose
FindNextFileW
FindFirstFileW
FileTimeToSystemTime
SystemTimeToFileTime
CreateDirectoryW
GetLocalTime
GetFileAttributesW
GetComputerNameA
DeviceIoControl
CreateFileA
GetProcessHeap
SetEndOfFile
WriteConsoleW
SetStdHandle
GetModuleFileNameW
LocalFree
LocalAlloc
lstrcmpA
GetEnvironmentVariableW
GetCurrentProcess
GetCurrentProcessId
DeleteFileW
GetLastError
CloseHandle
InitializeCriticalSection
GetModuleHandleExW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
OutputDebugStringW
MultiByteToWideChar
GetVersionExW
HeapReAlloc
SetFilePointer
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetFileType
SetHandleCount
HeapDestroy
HeapCreate
FlushFileBuffers
GetConsoleMode
GetConsoleCP
RaiseException
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetStdHandle
WriteFile
ExitProcess
HeapSize
Sleep
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCommandLineA
HeapAlloc
HeapFree
InterlockedIncrement
InterlockedDecrement
DecodePointer
EncodePointer
RtlUnwind
CreateFileW
FileTimeToLocalFileTime
lstrlenW
GetModuleHandleW
GetProcAddress
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
user32
RegisterWindowMessageW
UpdateWindow
ShowWindow
LoadCursorW
DestroyIcon
GetIconInfo
DefWindowProcW
CreateWindowExW
DispatchMessageW
BeginPaint
EndPaint
GetMessageW
RegisterClassExW
TranslateMessage
gdi32
GetObjectW
DeleteObject
advapi32
ConvertSidToStringSidA
RegEnumKeyExA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegQueryValueExW
SetSecurityInfo
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
GetTokenInformation
GetUserNameW
RegSetValueExW
RegOpenKeyExA
shell32
ord165
SHBrowseForFolderW
SHGetFileInfoW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ole32
CoUninitialize
CoInitialize
CLSIDFromProgID
CoTaskMemFree
CoInitializeSecurity
CoCreateInstance
oleaut32
VariantClear
SysAllocString
VariantInit
SysFreeString
shlwapi
PathCombineW
PathRemoveFileSpecW
PathFileExistsW
secur32
GetUserNameExW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
psapi
GetModuleBaseNameW
EnumProcesses
GetProcessImageFileNameW
GetModuleFileNameExW
GetMappedFileNameA
GetProcessMemoryInfo
gdiplus
GdiplusShutdown
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipGetImageHeight
GdipGetImageEncoders
GdipCloneImage
GdipGetImagePixelFormat
GdipGetImageEncodersSize
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipSaveImageToFile
GdipDisposeImage
GdipFree
GdipAlloc
GdiplusStartup
GdipCreateBitmapFromHICON
crypt32
CertFreeCertificateContext
CryptMsgClose
CertCloseStore
CryptMsgGetParam
CryptQueryObject
CryptBinaryToStringW
CryptStringToBinaryW
CryptDecodeObject
ws2_32
WSAStartup
WSACleanup
iphlpapi
GetAdaptersInfo
Sections
.text Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ