Static task
static1
Behavioral task
behavioral1
Sample
MW3CheatBlocker.v1.2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
MW3CheatBlocker.v1.2.exe
Resource
win10v2004-20240709-en
General
-
Target
MW3CheatBlocker.v1.2.exe
-
Size
11.5MB
-
MD5
0e3ec063a8917521673b28e4f089faf6
-
SHA1
d4150df0010b15985a04ae0607f8caacb8783313
-
SHA256
a64d2ce94175c8e25546f8c4d525a4137712a29b7c38c2cf953464fa86286e29
-
SHA512
934bd06b77fa93b73d3d098fe8387059b9483a81cdf4b6dfd0be5ac5b152af6888436b14cb67d87179a6e42899af4ce6f3ebb66739f228f0036debbdc1ceb366
-
SSDEEP
196608:DPDGAwgGiA2h3rjmk1IOrZsrc6Gzd+dCs9zKVMYniHF28q:jYgD3HzIYZyapstwMYil28
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource MW3CheatBlocker.v1.2.exe
Files
-
MW3CheatBlocker.v1.2.exe.exe windows:6 windows x64 arch:x64
Password: asd
71ad95ba370be2d81b654e3f21b886ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapSize
GetVersion
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
UnhookWindowsHookEx
CharUpperBuffW
advapi32
CryptEncrypt
shell32
ShellExecuteW
msvcp140
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
ntdll
RtlLookupFunctionEntry
normaliz
IdnToAscii
wldap32
ord33
crypt32
CertCreateCertificateChainEngine
ws2_32
ntohs
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140
__std_terminate
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_resetstkoflw
api-ms-win-crt-string-l1-1-0
strcspn
api-ms-win-crt-heap-l1-1-0
malloc
api-ms-win-crt-stdio-l1-1-0
__p__commode
api-ms-win-crt-filesystem-l1-1-0
remove
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-convert-l1-1-0
strtoll
api-ms-win-crt-time-l1-1-0
_localtime64_s
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-math-l1-1-0
__setusermatherr
Sections
.text Size: - Virtual size: 536KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.]mt Size: - Virtual size: 8.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.3^t Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jM= Size: 11.2MB - Virtual size: 11.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 245KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ