C:\Users\alfon\Desktop\INJECTOR\output\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
COD+Spoofer+++AC+BLOCKER.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
COD+Spoofer+++AC+BLOCKER.exe
Resource
win10v2004-20240802-en
General
-
Target
COD+Spoofer+++AC+BLOCKER.exe
-
Size
867KB
-
MD5
291bcba8deaa96aec83c371a1648a09b
-
SHA1
332068274ae1c817d38dc83d63cbd03593082b05
-
SHA256
96a8469bc6481be13ff3d21f9f0b9e967d47ad36e9af8ff38cd525ad574ebd7a
-
SHA512
026e1e1104abac58b5647c9766159314fcc2ef66f041287088ceefafcac053d558846679c6671cbdbc4e970b5b1dc83a9b18c8c34be1f80c9c1f08db251e3b25
-
SSDEEP
12288:Yi2BaV0/6DYb0I174kNWWQjAhww9rKflT4o+PZE9O2bJIC0fDNNVE:Yi2BM06sbpbNW5jWww9SWo+O93l0fZH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource COD+Spoofer+++AC+BLOCKER.exe
Files
-
COD+Spoofer+++AC+BLOCKER.exe.exe windows:6 windows x64 arch:x64
4ddba20d0a5530fc36db31dae36f7a4d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
Beep
GetWindowsDirectoryW
LoadLibraryW
Process32FirstW
DeleteFileW
LoadLibraryA
CreateFileA
Process32NextW
GetLastError
Sleep
CreateToolhelp32Snapshot
OutputDebugStringW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetFileInformationByHandleEx
SetFileInformationByHandle
GetFileAttributesExW
FindFirstFileW
FindClose
GetLocaleInfoEx
WideCharToMultiByte
GetFileSizeEx
WaitForMultipleObjects
PeekNamedPipe
GetFileType
GetEnvironmentVariableA
MultiByteToWideChar
WaitForSingleObjectEx
MoveFileExA
GetTickCount
QueryPerformanceCounter
VerifyVersionInfoA
GetSystemDirectoryA
QueryPerformanceFrequency
SleepEx
LeaveCriticalSection
EnterCriticalSection
LocalFree
FormatMessageA
GetModuleHandleW
GetModuleHandleA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
VirtualProtect
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DeviceIoControl
GetProcAddress
FreeLibrary
GetConsoleWindow
QueryFullProcessImageNameW
IsDebuggerPresent
LoadLibraryExA
TerminateProcess
VirtualAlloc
WriteFile
GetStdHandle
GetCurrentProcess
VirtualFree
SetConsoleTextAttribute
SetLastError
GetModuleFileNameA
ReadFile
CloseHandle
CreateFileW
AreFileApisANSI
user32
UnhookWindowsHookEx
MessageBoxW
GetWindowThreadProcessId
SetWindowsHookExW
EnumWindows
PostThreadMessageW
shell32
ShellExecuteW
msvcp140
?_Xbad_function_call@std@@YAXXZ
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??Bid@locale@std@@QEAA_KXZ
?always_noconv@codecvt_base@std@@QEBA_NXZ
?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?good@ios_base@std@@QEBA_NXZ
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?uncaught_exceptions@std@@YAHXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?_Xout_of_range@std@@YAXPEBD@Z
?_Winerror_map@std@@YAHH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?id@?$ctype@D@std@@2V0locale@2@A
?_Xlength_error@std@@YAXPEBD@Z
?_Syserror_map@std@@YAPEBDH@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
ntdll
VerSetConditionMask
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlImageNtHeader
normaliz
IdnToAscii
wldap32
ord217
ord46
ord211
ord60
ord45
ord50
ord41
ord143
ord26
ord27
ord32
ord301
ord200
ord30
ord79
ord35
ord22
ord33
crypt32
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
ws2_32
WSASetLastError
WSAIoctl
send
WSAStartup
recv
WSACleanup
accept
htonl
listen
ioctlsocket
__WSAFDIsSet
select
getaddrinfo
freeaddrinfo
recvfrom
sendto
gethostname
ntohl
WSAGetLastError
socket
closesocket
setsockopt
ntohs
htons
bind
getsockopt
getsockname
getpeername
connect
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
__std_exception_destroy
strchr
strrchr
__std_exception_copy
_CxxThrowException
memchr
memcmp
memcpy
memmove
memset
strstr
__C_specific_handler
__current_exception
__current_exception_context
api-ms-win-crt-string-l1-1-0
tolower
_strdup
strpbrk
strcpy_s
strspn
strcspn
strncpy
strncmp
isupper
strcmp
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_cexit
_seh_filter_exe
_set_app_type
_resetstkoflw
_register_onexit_function
_invalid_parameter_noinfo
_initialize_narrow_environment
exit
__sys_nerr
_getpid
strerror
_get_initial_narrow_environment
_beginthreadex
_initterm
_initterm_e
_exit
system
__p___argc
abort
terminate
__p___argv
_errno
_configure_narrow_argv
_invalid_parameter_noinfo_noreturn
_initialize_onexit_table
_c_exit
_register_thread_local_exe_atexit_callback
api-ms-win-crt-stdio-l1-1-0
fsetpos
setvbuf
fgetpos
fread
fwrite
_get_stream_buffer_pointers
__p__commode
_read
fgets
fgetc
_set_fmode
_pclose
fclose
fflush
_popen
__stdio_common_vsprintf
_write
fputc
_close
__acrt_iob_func
_open
_lseeki64
fopen
fputs
__stdio_common_vsscanf
ungetc
feof
fseek
_fseeki64
ftell
api-ms-win-crt-heap-l1-1-0
realloc
malloc
_set_new_mode
free
calloc
_callnewh
api-ms-win-crt-utility-l1-1-0
rand
qsort
srand
api-ms-win-crt-time-l1-1-0
_gmtime64
_time64
strftime
_localtime64_s
api-ms-win-crt-filesystem-l1-1-0
_fstat64
_lock_file
_unlink
_access
_unlock_file
_stat64
api-ms-win-crt-convert-l1-1-0
strtoul
strtol
atoi
strtoull
strtoll
strtod
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
localeconv
_configthreadlocale
api-ms-win-crt-math-l1-1-0
_dclass
__setusermatherr
advapi32
AddAccessAllowedAce
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
ConvertSidToStringSidA
CopySid
SetSecurityInfo
IsValidSid
InitializeAcl
GetTokenInformation
GetLengthSid
OpenProcessToken
CryptEncrypt
Sections
.text Size: 464KB - Virtual size: 463KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 272KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ