C:\SkullGirls.pdb
Static task
static1
General
-
Target
SkullGirls.exe
-
Size
4.5MB
-
MD5
e5484d3bdc17ebcb7110c2317a5d94ea
-
SHA1
1563b00a09fee3bfba84b312870658df78c479d0
-
SHA256
3fb92f4a7607ac8937cfe299c2c087ed88db1acb084ef2f38856749ea154e4c1
-
SHA512
3fd4c87b2438f96b4096d8ac96a7cdd8d6d98b65d8091ef503995bf2d424d8145a4f218eb12614ab69a86f790231fa1d3b84d2f38f0ebf7ffe0c128b3e35ea5d
-
SSDEEP
98304:gOBQ7GsS0cLVogTogXdgF5YRkK2ASXoUiY3semSGYAAFSm1d8Mv:gO5oJaOjEkK25sqGYAk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SkullGirls.exe
Files
-
SkullGirls.exe.exe windows:6 windows x86 arch:x86
d9a503b433d7c9d5985c302fbb8d23a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
htons
WSACleanup
inet_ntoa
ntohs
sendto
htonl
ntohl
WSAStartup
winmm
timeGetTime
PlaySoundW
timeEndPeriod
timeBeginPeriod
dbghelp
MiniDumpWriteDump
d3d9
Direct3DCreate9
dinput8
DirectInput8Create
xinput9_1_0
XInputGetState
d3dx9_43
D3DXCreateFontW
D3DXCompileShader
D3DXCreateTextureFromFileInMemoryEx
tolk
Tolk_HasBraille
Tolk_HasSpeech
Tolk_Load
Tolk_Output
Tolk_Unload
steam_api
SteamAPI_RunCallbacks
SteamAPI_RegisterCallResult
SteamAPI_RegisterCallback
SteamAPI_Init
SteamAPI_Shutdown
SteamAPI_UnregisterCallback
SteamInternal_FindOrCreateUserInterface
SteamAPI_GetHSteamUser
SteamInternal_ContextInit
SteamAPI_UnregisterCallResult
SteamAPI_RestartAppIfNecessary
SteamInternal_CreateInterface
kernel32
GetTimeZoneInformation
DeleteFileW
HeapReAlloc
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
EnumSystemLocalesW
IsValidLocale
SetStdHandle
HeapSize
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapAlloc
HeapFree
GetCommandLineW
GetCommandLineA
GetFullPathNameW
GetFileType
GetDriveTypeW
GetTempPathW
FreeLibraryAndExitThread
ExitThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindNextFileW
FindFirstFileExW
FindClose
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
InterlockedPushEntrySList
RtlUnwind
OutputDebugStringW
GetStartupInfoW
CreateDirectoryA
CreateDirectoryW
GetFileAttributesExW
MoveFileExW
CopyFileW
GetLastError
QueryPerformanceFrequency
CloseHandle
CreateThread
QueryPerformanceCounter
EnterCriticalSection
ReleaseSemaphore
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
CreateEventW
SetEvent
CreateSemaphoreW
OutputDebugStringA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FreeLibrary
FormatMessageA
LoadLibraryExW
DeleteCriticalSection
LocalFree
ReadFile
GetFileSizeEx
GetStdHandle
WriteFile
GetModuleHandleExW
IsValidCodePage
GetModuleFileNameW
WaitForMultipleObjects
InitializeCriticalSectionAndSpinCount
CreatePipe
CreateFileW
FreeEnvironmentStringsW
DuplicateHandle
GetExitCodeThread
GetCurrentDirectoryW
SetFilePointerEx
CreateProcessW
GetModuleHandleW
WideCharToMultiByte
GetEnvironmentStringsW
FlushFileBuffers
GetExitCodeProcess
Sleep
GetTickCount
InitializeCriticalSectionEx
RaiseException
DecodePointer
VirtualFree
VirtualAlloc
GlobalAlloc
GlobalLock
GlobalUnlock
VerSetConditionMask
VerifyVersionInfoW
MultiByteToWideChar
CreateFileA
GetUserDefaultLCID
GetCurrentProcess
GetCurrentThreadId
CreateSemaphoreExA
GetTickCount64
WaitForSingleObjectEx
LoadLibraryW
GetLocalTime
ExitProcess
GetCurrentProcessId
SetThreadExecutionState
IsDebuggerPresent
CheckRemoteDebuggerPresent
SetUnhandledExceptionFilter
DebugBreak
GetSystemTimeAsFileTime
LCMapStringEx
EncodePointer
GetACP
GetOEMCP
GetProcessHeap
SetEnvironmentVariableW
SetEndOfFile
TerminateProcess
WriteConsoleW
GetStringTypeW
GetCPInfo
ResetEvent
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
user32
CallNextHookEx
ScreenToClient
ShowWindow
RegisterDeviceNotificationW
TrackMouseEvent
UnhookWindowsHookEx
SetCapture
SetWindowsHookExW
PostQuitMessage
SystemParametersInfoW
UnregisterDeviceNotification
UpdateWindow
ReleaseCapture
LoadImageW
CreateWindowExW
GetCursorPos
GetSystemMetrics
OpenClipboard
CloseClipboard
EmptyClipboard
SetClipboardData
DispatchMessageW
PeekMessageW
TranslateMessage
GetClientRect
UnregisterClassW
ChangeDisplaySettingsW
EnumDisplaySettingsExW
EnumDisplayDevicesW
LoadCursorW
SetCursor
EnumDisplaySettingsW
GetWindowRect
GetDesktopWindow
PostMessageW
MessageBoxA
SetWindowPos
RegisterClassExW
DestroyWindow
DefWindowProcW
SetWindowLongW
IsIconic
AdjustWindowRect
shell32
SHGetFolderPathW
SHGetFolderPathA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
oleaut32
SysFreeString
SysAllocString
advapi32
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
iphlpapi
GetIfEntry2
GetIfTable2Ex
FreeMibTable
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 196KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ