f:\Experimentation\WW_StartGame3\release\WW_StartGame3.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0049a1989cde133fb52f1a661cae98b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0049a1989cde133fb52f1a661cae98b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
0049a1989cde133fb52f1a661cae98b0N
-
Size
116KB
-
MD5
0049a1989cde133fb52f1a661cae98b0
-
SHA1
706c854260f5bd61b4ddb9f6f7e8b7564c0e300b
-
SHA256
b5d898e70e10bb3fe255893d4f265966c8e956b7d4fac4a236fc3e627c37a954
-
SHA512
5d09ee673becda0a1928691ac7c9af84ed937d828c55ac4566d56cc60377386829ac24d7116554cc1237899001882246da055f57845d6c0b93dba8c8c45a3211
-
SSDEEP
3072:gEewD9xZT2bagyitK7t/FZNSDADeak7dJHB/Ae:gbwrZT2br1tg5SsQLH5Ae
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0049a1989cde133fb52f1a661cae98b0N
Files
-
0049a1989cde133fb52f1a661cae98b0N.exe windows:4 windows x86 arch:x86
80c661a6be8463d2a57960eda032aa8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenW
lstrcmpiW
GetPrivateProfileIntW
GetPrivateProfileStringW
lstrcmpW
WritePrivateProfileStringW
GetCommandLineW
GetModuleFileNameW
WaitForSingleObject
FlushFileBuffers
CloseHandle
CreateFileA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
RaiseException
RtlUnwind
GetLastError
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
LoadLibraryA
InitializeCriticalSection
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
shell32
ShellExecuteExW
shlwapi
PathFileExistsW
StrRChrW
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ