C:\Users\ophx1\source\repos\nigger cheat\build\nigger cheat.pdb
Static task
static1
Behavioral task
behavioral1
Sample
nigger cheat.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
nigger cheat.exe
Resource
win10v2004-20240802-en
General
-
Target
nigger cheat.exe
-
Size
323KB
-
MD5
bf442b87319a3d85216d000c17a33941
-
SHA1
40abbaf340354d0f14e721eb1a9942749ae93fae
-
SHA256
72cad95f570c5426400cfec9798e05b382e3690c8ebdd05a3e2583ac3ccd709b
-
SHA512
cdf9a8c8cd155d7b2d85ba10535a46c659c94b619a947acbc841aeefbcec39119126e4d4868db9d3b7f70b5a65d3fb9f626587901ef16fdada4549577d417921
-
SSDEEP
6144:NCrCVRwj2LPu8ctpLE2ZcyTJslnNOqz+THwBA0Dnrht8Xwn8Y:U6cTcty4Dnrht8A8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource nigger cheat.exe
Files
-
nigger cheat.exe.exe windows:6 windows x64 arch:x64
c206f81e493be2153288ef4d4a380c6d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
LoadCursorW
GetForegroundWindow
ClientToScreen
ScreenToClient
GetKeyState
UpdateWindow
RegisterClassExA
GetDesktopWindow
SetWindowLongW
LoadIconW
TranslateMessage
SetLayeredWindowAttributes
CreateWindowExA
DefWindowProcA
PeekMessageW
DispatchMessageW
GetAsyncKeyState
ShowWindow
GetSystemMetrics
SetWindowPos
DestroyWindow
GetWindowRect
SetClipboardData
SetCursor
GetClientRect
SetCursorPos
GetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
GetWindow
kernel32
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ReleaseSRWLockExclusive
RtlVirtualUnwind
RtlLookupFunctionEntry
IsDebuggerPresent
Process32FirstW
lstrcmpiW
GetModuleHandleW
Beep
CloseHandle
RtlCaptureContext
Process32NextW
Sleep
CreateToolhelp32Snapshot
CreateFileW
VirtualAlloc
DeviceIoControl
SetConsoleTitleA
VirtualFree
QueryPerformanceCounter
FreeLibrary
InitializeSListHead
MultiByteToWideChar
GlobalAlloc
GlobalFree
GlobalLock
WideCharToMultiByte
GlobalUnlock
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
imm32
ImmGetContext
ImmReleaseContext
ImmSetCandidateWindow
ImmSetCompositionWindow
dwmapi
DwmExtendFrameIntoClientArea
msvcp140
?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?good@ios_base@std@@QEBA_NXZ
?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
?ignore@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAHXZ
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?id@?$ctype@D@std@@2V0locale@2@A
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?_Xlength_error@std@@YAXPEBD@Z
??Bid@locale@std@@QEAA_KXZ
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exceptions@std@@YAHXZ
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
d3d9
Direct3DCreate9Ex
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memset
__C_specific_handler
__current_exception_context
__current_exception
__std_exception_copy
__std_exception_destroy
strstr
__std_terminate
_CxxThrowException
memchr
memcmp
memcpy
memmove
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
ftell
_set_fmode
fclose
fseek
fflush
fwrite
_wfopen
__stdio_common_vsprintf
__p__commode
__stdio_common_vsprintf_s
fread
__stdio_common_vfprintf
__stdio_common_vsscanf
api-ms-win-crt-utility-l1-1-0
qsort
rand
api-ms-win-crt-string-l1-1-0
strncmp
strncpy
strcmp
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
_set_new_mode
free
api-ms-win-crt-convert-l1-1-0
atof
api-ms-win-crt-runtime-l1-1-0
__p___argc
__p___argv
_c_exit
_exit
_initterm_e
_initterm
system
_invalid_parameter_noinfo_noreturn
terminate
_get_initial_narrow_environment
_set_app_type
_configure_narrow_argv
_seh_filter_exe
_register_thread_local_exe_atexit_callback
_cexit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
exit
api-ms-win-crt-filesystem-l1-1-0
remove
api-ms-win-crt-math-l1-1-0
powf
sinf
sqrt
sqrtf
fmodf
cosf
ceilf
atan2
acosf
__setusermatherr
asin
pow
atan
tanf
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 254KB - Virtual size: 253KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ