E:\Project\NewProject\直播\steamBox\x64\Release\steamBox.pdb
Static task
static1
Behavioral task
behavioral1
Sample
39792ffd324321e9626e730f733f060edda0a5bc9e18ca10fde932529e0849b5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
39792ffd324321e9626e730f733f060edda0a5bc9e18ca10fde932529e0849b5.exe
Resource
win10v2004-20240802-en
General
-
Target
39792ffd324321e9626e730f733f060edda0a5bc9e18ca10fde932529e0849b5
-
Size
909KB
-
MD5
9bf1dd65f46b08da46c859bcd64cf1e2
-
SHA1
f44885e512a565b77ecb3f01b70f9bd2d85aeda6
-
SHA256
39792ffd324321e9626e730f733f060edda0a5bc9e18ca10fde932529e0849b5
-
SHA512
1f4f7b6ed0af6097628f78cbff6a58440c56f39c7acc0325b1d91e7a184bbfaceae1e327a93ac5e1602eb1e94fa6cafd873daec24b5e9d0d1a8e7ef91ad40a78
-
SSDEEP
24576:etBxCQspLELT9GCMpZVVE6UCuqfBPhnk:acpQLo3VE64qjnk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39792ffd324321e9626e730f733f060edda0a5bc9e18ca10fde932529e0849b5
Files
-
39792ffd324321e9626e730f733f060edda0a5bc9e18ca10fde932529e0849b5.exe windows:6 windows x64 arch:x64
410f3e37d36b4d1babba1392b526533e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
TerminateProcess
FindNextFileA
FindResourceA
FindClose
lstrcmpA
OpenProcess
CreateToolhelp32Snapshot
Sleep
GetTickCount64
GetLastError
MoveFileExA
GetSystemDirectoryA
LockResource
DeleteFileA
Process32Next
CloseHandle
LoadResource
SetFileAttributesA
CreateDirectoryA
SetEndOfFile
WriteConsoleW
HeapSize
GetTimeZoneInformation
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
SetStdHandle
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
QueryPerformanceFrequency
IsValidLocale
GetLocaleInfoW
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
ReadConsoleW
GetConsoleMode
SetFilePointerEx
HeapAlloc
HeapFree
HeapReAlloc
WriteFile
GetStdHandle
GetModuleFileNameW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetDriveTypeW
GetModuleHandleExW
ExitProcess
ReadFile
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
FindFirstFileA
Process32First
MoveFileA
SizeofResource
LoadLibraryA
GetModuleHandleA
GlobalUnlock
WideCharToMultiByte
GlobalLock
GlobalFree
GlobalAlloc
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetCPInfo
GetModuleFileNameA
QueryPerformanceCounter
FreeLibrary
VerSetConditionMask
CompareStringW
GetProcAddress
GetUserDefaultLCID
MultiByteToWideChar
GetStringTypeW
LCMapStringEx
DecodePointer
EncodePointer
DeleteCriticalSection
InitializeCriticalSectionEx
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
GetFileInformationByHandleEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
LocalFree
FormatMessageA
GetLocaleInfoEx
GetCurrentDirectoryW
CreateFileW
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
SetFileInformationByHandle
AreFileApisANSI
user32
SetProcessDPIAware
UnregisterClassA
GetClientRect
SetWindowLongW
ReleaseCapture
SetForegroundWindow
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
GetCursorPos
ReleaseDC
RegisterClassExA
IsIconic
SetClipboardData
SetWindowPos
SetCursor
DispatchMessageA
GetWindowRect
MessageBoxW
GetSystemMetrics
wsprintfA
GetWindowTextA
TranslateMessage
LoadIconA
PeekMessageA
PostQuitMessage
UpdateWindow
GetWindowLongW
AdjustWindowRectEx
GetKeyState
LoadCursorA
DestroyWindow
GetDC
SetCapture
MonitorFromWindow
EnumDisplayMonitors
ScreenToClient
SetWindowTextW
WindowFromPoint
ShowWindow
GetCapture
SetWindowLongA
ClientToScreen
IsChild
TrackMouseEvent
GetMonitorInfoA
GetForegroundWindow
DefWindowProcA
CreateWindowExA
SetLayeredWindowAttributes
SetFocus
BringWindowToTop
SetCursorPos
gdi32
GetDeviceCaps
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
GetUserNameA
RegOpenKeyExA
shell32
ShellExecuteA
SHGetKnownFolderPath
SHGetSpecialFolderPathA
ole32
CoTaskMemFree
imm32
ImmAssociateContextEx
ImmSetCandidateWindow
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
d3dcompiler_47
D3DCompile
d3d11
D3D11CreateDeviceAndSwapChain
wininet
HttpQueryInfoA
InternetSetOptionA
HttpAddRequestHeadersA
InternetOpenA
InternetCloseHandle
HttpSendRequestA
InternetConnectA
InternetReadFile
HttpOpenRequestA
Sections
.text Size: 709KB - Virtual size: 709KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ