C:\BuildAgent\work\28a9fc745d959c22\desktop\bin\Win32\Release\Amazon Games.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bd8c13c9247ea008ff9e1ea0986fa300N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd8c13c9247ea008ff9e1ea0986fa300N.exe
Resource
win10v2004-20240802-en
General
-
Target
bd8c13c9247ea008ff9e1ea0986fa300N.exe
-
Size
1.5MB
-
MD5
bd8c13c9247ea008ff9e1ea0986fa300
-
SHA1
13f35a0167a2a2c3a68fe428b3138e87b7b9c764
-
SHA256
2b9843731e1c6397aca472ccd586de6b2ea87c84af28dd3eb19e956496152b53
-
SHA512
c9a2c182b4745941101f90527c6a14154821c5078b178b4c44398417d79e0e493b2d7f9eb319821fe4b40ecbe9ada13339cd40f4b0bae0cb884f84645372c432
-
SSDEEP
49152:OcWcvT9P+eTfx73Ab4zFL4TmDzD2Q+unUfck2cC:OcZTFZ3Abkuc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd8c13c9247ea008ff9e1ea0986fa300N.exe
Files
-
bd8c13c9247ea008ff9e1ea0986fa300N.exe.exe windows:6 windows x86 arch:x86
9fa0af362cadf8651dd92276e61fb2b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTempPathW
InitializeCriticalSectionEx
GetLocaleInfoW
CreateFileW
GetVersionExW
GetModuleHandleA
CreateToolhelp32Snapshot
CreateEventW
FormatMessageW
Process32NextW
QueryPerformanceFrequency
DeleteFileW
Process32FirstW
RaiseException
CreateThread
DecodePointer
GetProcAddress
DeleteCriticalSection
GlobalMemoryStatusEx
WideCharToMultiByte
GetDiskFreeSpaceExA
QueryPerformanceCounter
GetExitCodeProcess
FindNextFileW
GetCurrentProcess
ReleaseSemaphore
FindClose
K32GetProcessMemoryInfo
FileTimeToSystemTime
GetSystemTime
CreateSemaphoreA
WaitNamedPipeA
CreateNamedPipeA
HeapFree
CreateFileA
SetEvent
GetCurrentThread
HeapAlloc
GetProcessHeap
CreateEventA
ConnectNamedPipe
GetExitCodeThread
SetThreadPriority
SetFilePointerEx
EnterCriticalSection
LeaveCriticalSection
SetLastError
GetThreadTimes
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
EncodePointer
IsProcessorFeaturePresent
QueueUserWorkItem
GetModuleHandleExW
GetUserDefaultUILanguage
FindFirstFileExW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
AreFileApisANSI
GetModuleHandleW
GetStringTypeW
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
CompareStringW
LCMapStringW
GetCPInfo
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
CreateTimerQueue
FreeLibrary
FreeLibraryAndExitThread
LoadLibraryExW
SignalObjectAndWait
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
VirtualAlloc
VirtualProtect
VirtualFree
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RtlUnwind
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
GetModuleFileNameA
WriteConsoleW
SetStdHandle
ExitThread
ExitProcess
GetACP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
FlushFileBuffers
HeapReAlloc
ReadConsoleW
HeapSize
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEndOfFile
GetModuleFileNameW
TerminateProcess
GetSystemDefaultUILanguage
WriteFile
GetStdHandle
GetFileSizeEx
ReadFile
CreateDirectoryW
OutputDebugStringW
Sleep
MultiByteToWideChar
GetDynamicTimeZoneInformation
GetLastError
CreateProcessW
GetCurrentProcessId
CloseHandle
WaitForSingleObject
OpenProcess
SetConsoleCtrlHandler
LocalFree
GetCommandLineW
GetCurrentDirectoryW
GetCurrentThreadId
shell32
CommandLineToArgvW
SHGetFolderPathW
winhttp
WinHttpConnect
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpOpen
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpReadData
WinHttpOpenRequest
WinHttpCloseHandle
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
rpcrt4
UuidCreate
user32
wsprintfW
ShowWindow
PostMessageW
GetWindowThreadProcessId
GetWindowTextW
IsIconic
SetForegroundWindow
GetClassNameW
EnumWindows
advapi32
OpenThreadToken
GetTokenInformation
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityDescriptorDacl
SetEntriesInAclA
AllocateAndInitializeSid
OpenProcessToken
InitializeSecurityDescriptor
InitializeAcl
GetLengthSid
GetUserNameW
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CoInitializeSecurity
oleaut32
VariantClear
SysAllocStringLen
VariantInit
SysFreeString
SysAllocString
Exports
Exports
AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
Sections
.text Size: 1023KB - Virtual size: 1022KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 241KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ