C:\vmagent_new\bin\joblist\714706\out\Release\GameChrome.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a485a42be98748d8ba690e9b6013dd75d5b4ab843aec738564c3d5e91e98db74.exe
Resource
win7-20240903-en
General
-
Target
a485a42be98748d8ba690e9b6013dd75d5b4ab843aec738564c3d5e91e98db74
-
Size
531KB
-
MD5
28d5532b797a4dcaffbeeaf472a9bf24
-
SHA1
cdf7934309b230a43f412cd6c6681c1fb112c835
-
SHA256
a485a42be98748d8ba690e9b6013dd75d5b4ab843aec738564c3d5e91e98db74
-
SHA512
36cd332679e33ec3cdc4b5577abbd6b3fea17c01aa8cf664b05caad8b34fecde41378f01291cda449e35e71e09c17b483fcbd14442087cf934dd4e6ac53868dc
-
SSDEEP
12288:5KijRP+2n82+SUf6LTMLNpOZSin/KR33M6:5KkD+SUf8TMxpOIO/KR3D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a485a42be98748d8ba690e9b6013dd75d5b4ab843aec738564c3d5e91e98db74
Files
-
a485a42be98748d8ba690e9b6013dd75d5b4ab843aec738564c3d5e91e98db74.exe windows:5 windows x86 arch:x86
fc71532c3d2f2d78235ac6c85d89ea2b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemTime
SystemTimeToFileTime
LoadLibraryW
GetTempPathW
GetFileType
SetFilePointer
WriteFile
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateFileA
LocalFileTimeToFileTime
ProcessIdToSessionId
LocalFree
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
RaiseException
SetLastError
SetThreadAffinityMask
GetCurrentThread
QueryPerformanceCounter
OpenFileMappingW
Sleep
SetEvent
InterlockedCompareExchange
ExitProcess
GetSystemTimeAsFileTime
CreateEventW
CreateMutexW
VirtualFreeEx
OutputDebugStringW
InterlockedDecrement
InterlockedIncrement
DecodePointer
GetFileSizeEx
SetFilePointerEx
FormatMessageW
TlsSetValue
HeapLock
ReleaseMutex
HeapWalk
TlsAlloc
TlsGetValue
TlsFree
HeapUnlock
OpenThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetACP
GetStdHandle
GetCommandLineW
GetCommandLineA
FreeLibraryAndExitThread
ExitThread
GetModuleHandleExW
RtlUnwind
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
GetCPInfo
GetStringTypeW
LCMapStringW
EncodePointer
ReadFile
GetCurrentProcess
OpenProcess
TerminateProcess
lstrcmpiW
WaitForSingleObject
CreateThread
HeapDestroy
FindClose
FindNextFileW
SetFileAttributesW
GetLastError
CreateDirectoryW
EnterCriticalSection
LeaveCriticalSection
CreateProcessW
InitializeCriticalSection
DeleteCriticalSection
FreeLibrary
LoadLibraryExW
GetProcAddress
GetModuleFileNameW
GetModuleHandleW
GetCurrentProcessId
CloseHandle
DeviceIoControl
CreateFileW
DeleteFileW
WideCharToMultiByte
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
WriteConsoleW
user32
DispatchMessageW
TranslateMessage
PeekMessageW
GetWindowThreadProcessId
GetDC
ScreenToClient
GetCursorPos
PostMessageW
FindWindowW
GetMessageW
DefWindowProcW
DestroyWindow
IsWindow
UnregisterClassW
RegisterClassExW
GetClassInfoExW
LoadCursorW
CreateWindowExW
SetWindowLongW
GetWindowLongW
CallWindowProcW
RegisterWindowMessageW
SendMessageW
PostQuitMessage
GetKeyState
SetFocus
SetParent
KillTimer
SetTimer
CharNextW
SetWindowPos
GetParent
ShowWindow
gdi32
GetDeviceCaps
advapi32
RegQueryValueExA
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
GetUserNameW
shell32
DragQueryFileW
SHFileOperationW
SHGetFolderPathW
CommandLineToArgvW
ole32
RevokeDragDrop
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
oleaut32
SysFreeString
VarUI4FromStr
SysAllocString
shlwapi
StrStrIA
SHSetValueW
PathIsRootW
PathRemoveFileSpecW
PathAddBackslashW
PathIsDirectoryW
PathFileExistsW
SHGetValueW
PathAppendW
PathFindFileNameW
SHDeleteKeyW
PathCombineW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
psapi
GetProcessImageFileNameW
Exports
Exports
??0ShellResourceRequestDetails@@QAE@XZ
??1ShellResourceRequestDetails@@QAE@XZ
??4ShellResourceRequestDetails@@QAEAAU0@ABU0@@Z
Sections
.text Size: 283KB - Virtual size: 283KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE