D:\Jenkins\.jenkins\workspace\MGame\general_user\DumpUper\Release\DumpReport.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1aa185051429eeb524766150cc1002505ca3a8970fc873c31af93e6f34a91a04.exe
Resource
win7-20241010-en
General
-
Target
1aa185051429eeb524766150cc1002505ca3a8970fc873c31af93e6f34a91a04
-
Size
936KB
-
MD5
2f0c594c48f5a47b219a3a42e1ef3292
-
SHA1
7c4bb57aa9979e28f6b849590af0ed6f6d71254d
-
SHA256
1aa185051429eeb524766150cc1002505ca3a8970fc873c31af93e6f34a91a04
-
SHA512
f97d7ba61c4b1a800bf181731e3aaa6dd9d1d80d27fcb2d040f28b3c977a211683824d82ad49eb299632c29e7b291422304a918fa10df8328318e916787f0940
-
SSDEEP
24576:I/FVqv41A9uY+EKcw1PHgbWZAweF0KKK0CfsZU+CM+gbOwEaomIU/wMzkiy:UAroEKcw+bzwJK0Y5aoLU/wlh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1aa185051429eeb524766150cc1002505ca3a8970fc873c31af93e6f34a91a04
Files
-
1aa185051429eeb524766150cc1002505ca3a8970fc873c31af93e6f34a91a04.exe windows:6 windows x86 arch:x86
ecd889b4ee637abdc321ac090937c1a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentThreadId
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryExW
lstrcmpiW
CreateDirectoryW
CreateFileW
OutputDebugStringW
CloseHandle
InitializeCriticalSection
TerminateProcess
OpenProcess
GetVersionExW
ReadProcessMemory
LoadLibraryW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCommandLineW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileSizeEx
GetPrivateProfileStringW
WritePrivateProfileStringW
RemoveDirectoryW
CopyFileW
WideCharToMultiByte
GetCurrentProcessId
ReleaseMutex
GetTempFileNameW
GetLastError
RaiseException
DecodePointer
WriteConsoleW
FlushFileBuffers
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
SetConsoleCtrlHandler
SetStdHandle
ReadConsoleW
EnumSystemLocalesW
MultiByteToWideChar
LocalFree
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
GetProcessHeap
HeapSize
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetCurrentThread
GetACP
GetStdHandle
GetModuleFileNameA
GetModuleHandleExW
GetTempPathW
DosDateTimeToFileTime
FileTimeToDosDateTime
LocalFileTimeToFileTime
ExitProcess
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
HeapFree
HeapReAlloc
ReadFile
InterlockedFlushSList
RtlUnwind
CreateMutexW
FileTimeToLocalFileTime
SystemTimeToFileTime
HeapAlloc
HeapDestroy
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
GetStringTypeW
FormatMessageW
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
Sleep
InitializeCriticalSectionEx
GetSystemWindowsDirectoryW
FreeResource
DeviceIoControl
lstrcmpA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetEvent
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
QueryPerformanceCounter
GetFileSize
WriteFile
SetEndOfFile
SetFilePointer
GetFileTime
SetFileTime
GetSystemTime
WaitForSingleObject
user32
TranslateMessage
GetMessageW
DispatchMessageW
IsWindow
SendMessageW
GetWindowLongW
CallWindowProcW
PostQuitMessage
PostMessageW
wsprintfW
LoadCursorW
SetWindowLongW
CharNextW
DestroyWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
DefWindowProcW
PeekMessageW
advapi32
GetTokenInformation
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegQueryValueExW
shell32
CommandLineToArgvW
ord165
ole32
CoTaskMemAlloc
CoInitialize
CoTaskMemFree
CoCreateGuid
CoCreateInstance
CoUninitialize
CoTaskMemRealloc
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
VarUI4FromStr
shlwapi
StrStrIW
StrCmpIW
PathRenameExtensionW
PathAppendW
PathRemoveFileSpecW
PathFileExistsW
wnsprintfW
StrStrIA
PathCombineW
StrTrimA
StrCmpNIW
PathFindFileNameW
PathIsDirectoryW
comctl32
InitCommonControlsEx
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
psapi
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 685KB - Virtual size: 684KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 101KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE