D:\a\WidescreenFixesPack\WidescreenFixesPack\data\SplinterCellChaosTheory.WidescreenFix\system\scripts\SplinterCellChaosTheory.WidescreenFix.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0a4efb455dd45731878edae2e8f89020N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0a4efb455dd45731878edae2e8f89020N.dll
Resource
win10v2004-20240709-en
General
-
Target
0a4efb455dd45731878edae2e8f89020N.exe
-
Size
841KB
-
MD5
0a4efb455dd45731878edae2e8f89020
-
SHA1
c59c0aed35babbc844a5d33033464c9393c96f54
-
SHA256
7e6ec1e0a7fec838ae2705f93acf8a0edcdcbce1801088c3c95ce4daceb6ff2d
-
SHA512
3f2e4e1c549c8895e2a8e5104ed430dd9c53b13a798b275ed138d5dfc52374089402be3dc496f8e551948354c330ff5519c7d645739b9c64ccba53503ff3f370
-
SSDEEP
12288:WVPTeR0rQwy4fYuJZs5npejOQDvxjOxMQMlqeBjluBrkkve7wdQZdaecpIL:WTZs5npejXJj6MQotluSGOXVcKL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a4efb455dd45731878edae2e8f89020N.exe
Files
-
0a4efb455dd45731878edae2e8f89020N.exe.dll windows:6 windows x86 arch:x86
0ba737097e0dcdd15747a17c0e5523dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CloseHandle
CreateThread
GetModuleFileNameW
GetModuleHandleExA
GetModuleHandleExW
GetProcAddress
GetCurrentProcessId
ExitProcess
GetSystemTimeAsFileTime
GetModuleHandleA
WritePrivateProfileStringW
AddVectoredExceptionHandler
IsBadReadPtr
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
GetSystemInfo
RemoveVectoredExceptionHandler
IsValidCodePage
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
GetConsoleOutputCP
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
GetCurrentThreadId
Sleep
SwitchToThread
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
GetLastError
MultiByteToWideChar
WideCharToMultiByte
LocalFree
FormatMessageA
GetLocaleInfoEx
RtlCaptureStackBackTrace
FreeLibrary
LoadLibraryExW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
WakeAllConditionVariable
SleepConditionVariableSRW
InitOnceBeginInitialize
InitOnceComplete
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
IsProcessorFeaturePresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
LCMapStringEx
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
LoadLibraryW
RtlUnwind
InterlockedFlushSList
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitThread
FreeLibraryAndExitThread
HeapFree
HeapAlloc
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
FlushFileBuffers
WriteFile
GetModuleHandleW
user32
GetDesktopWindow
MonitorFromWindow
GetMonitorInfoW
CallWindowProcW
ShowWindow
GetWindowThreadProcessId
EnumWindows
SetWindowLongW
IsWindowVisible
crypt32
CertGetNameStringW
CertFreeCertificateContext
CryptVerifyMessageSignature
wintrust
WinVerifyTrust
imagehlp
ImageEnumerateCertificates
ImageGetCertificateHeader
ImageGetCertificateData
advapi32
RegOpenKeyExW
RegQueryValueExW
Exports
Exports
InitializeASI
Sections
.text Size: 282KB - Virtual size: 281KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 515KB - Virtual size: 515KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ