D:\NEWPACKV2\SERVERFILE\CUM1\SUB1\GameServer\GameServer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
70d12e39f9e6d0bd4a6a0a154b1fb159354839c146ada493f549916bfad51dea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
70d12e39f9e6d0bd4a6a0a154b1fb159354839c146ada493f549916bfad51dea.exe
Resource
win10v2004-20241007-en
General
-
Target
70d12e39f9e6d0bd4a6a0a154b1fb159354839c146ada493f549916bfad51dea
-
Size
10.8MB
-
MD5
d648a628eaaeb378efd738e2690bc7b7
-
SHA1
393f7f51037baaf15f2491c14621bf5d41aa6a43
-
SHA256
70d12e39f9e6d0bd4a6a0a154b1fb159354839c146ada493f549916bfad51dea
-
SHA512
1edbc6929516302d445bb2ae35ebd70b9073cb530b69a8a3b3f85fd285be9a354c7fc1ac091b04823297b7e619c47ba2732852303a7d4b387b11753df347d0b0
-
SSDEEP
49152:vXbozXhPDc3gpU/b8NkGiBUrTRj1r8n2r/DSRopsUVkqqQ:PsRgQpob8NFeRCVAQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70d12e39f9e6d0bd4a6a0a154b1fb159354839c146ada493f549916bfad51dea
Files
-
70d12e39f9e6d0bd4a6a0a154b1fb159354839c146ada493f549916bfad51dea.exe windows:5 windows x86 arch:x86
04898ccd1d365fe03c8875564f8ded43
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateThread
CreateMutexA
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
FindFirstFileA
FindNextFileA
GetSystemInfo
ExitProcess
CloseHandle
CreateDirectoryA
CreateFileA
SetFilePointer
WriteFile
ReadFile
GlobalAlloc
GetFileSize
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
SetErrorMode
SetUnhandledExceptionFilter
TerminateProcess
DeleteCriticalSection
LeaveCriticalSection
CreateTimerQueue
DeleteTimerQueue
CreateTimerQueueTimer
MultiByteToWideChar
TerminateThread
CreateIoCompletionPort
SetThreadPriority
CreateSemaphoreA
ReleaseSemaphore
GetQueuedCompletionStatus
WaitForSingleObject
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
GetSystemTime
InterlockedExchangeAdd
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
DecodePointer
EncodePointer
GetProcAddress
LoadLibraryExA
FreeLibrary
FormatMessageA
GetModuleFileNameA
EnterCriticalSection
InterlockedExchange
Sleep
GetLocalTime
GetPrivateProfileIntA
GetTickCount
user32
SetWindowTextA
SetTimer
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadIconA
LoadCursorA
LoadStringA
wsprintfA
ShowWindow
UpdateWindow
GetWindowLongA
SendMessageA
DialogBoxParamA
DestroyWindow
DefWindowProcA
PostQuitMessage
EndDialog
RegisterClassExA
MessageBoxA
GetDlgItem
SetRect
CreateWindowExA
ReleaseDC
DrawTextA
FillRect
GetDC
MoveWindow
GetClientRect
gdi32
CreateFontA
DeleteObject
SetBkMode
SelectObject
SetTextColor
TextOutA
TextOutW
CreateSolidBrush
odbc32
ord24
ord75
ord7
ord31
ord36
ord11
ord20
ord18
ord8
ord4
ord26
ord16
ord13
msvcp100
?_Swap_all@_Container_base12@std@@QAEXAAU12@@Z
??1_Container_base12@std@@QAE@XZ
?_Random_device@tr1@std@@YAIXZ
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
ws2_32
inet_ntoa
htonl
sendto
WSAAccept
WSARecv
WSASend
listen
bind
ntohl
WSASocketA
socket
htons
inet_addr
gethostbyname
connect
WSAGetLastError
WSAAsyncSelect
closesocket
recv
send
WSAStartup
dbghelp
MiniDumpWriteDump
msvcr100
_unlock
__dllonexit
strspn
_lock
_onexit
?terminate@@YAXXZ
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
_acmdln
_initterm
__CxxFrameHandler3
memset
_strdup
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_crt_debugger_hook
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
localeconv
__set_app_type
strrchr
setvbuf
clearerr
fscanf
tmpfile
_popen
_pclose
exit
setlocale
strftime
clock
getenv
tmpnam
rename
remove
system
iscntrl
isgraph
islower
ispunct
isupper
isxdigit
toupper
_CIexp
_CIlog
_CIlog10
_CIsqrt
_CIfmod
_CIatan2
_CIatan
??3@YAXPAX@Z
fopen_s
malloc
fclose
fread
free
??2@YAPAXI@Z
strcpy_s
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
strncpy_s
vsprintf_s
memcpy_s
_difftime64
_time64
rand
_localtime64
srand
ldiv
??_V@YAXPAX@Z
fgetc
isspace
ungetc
getc
isdigit
atof
isalpha
isalnum
fopen
strncpy
memmove
_stricmp
atoi
_mktime64
_localtime64_s
strtok_s
printf
_gmtime64
sscanf_s
_strlwr
strstr
strncmp
sprintf
memchr
vsprintf
fprintf
tolower
strcat_s
strtol
strtod
_fseeki64
_ftelli64
ferror
fwrite
ceil
modf
asctime_s
strerror
_errno
memcpy
feof
freopen
__iob_func
strchr
realloc
fflush
_CIpow
floor
ldexp
strpbrk
abort
longjmp
_setjmp3
strcoll
frexp
fgets
_CIsin
_CIsinh
_CIcos
_CIcosh
_CItan
_CItanh
_CIasin
_CIacos
_CxxThrowException
iphlpapi
GetAdaptersInfo
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7.9MB - Virtual size: 31.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 878KB - Virtual size: 877KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ