C:\vmagent_new\bin\joblist\822218\out\Release\GameChrome.pdb
Static task
static1
Behavioral task
behavioral1
Sample
027cda0c85403dd8093a8d49f4f251c41bf6641ce824ae88aac760407a2d8f88.exe
Resource
win7-20241010-en
General
-
Target
027cda0c85403dd8093a8d49f4f251c41bf6641ce824ae88aac760407a2d8f88
-
Size
543KB
-
MD5
44aa31516359c4cf472ac26b3d3932b0
-
SHA1
37f677c102e4d06671161d505fb2022c81c9d1f1
-
SHA256
027cda0c85403dd8093a8d49f4f251c41bf6641ce824ae88aac760407a2d8f88
-
SHA512
54075823a89862944f37e898fb1021b7fdda79373956ba17d21bdd4062033a0084c895ac5d882992d1481d45e3dba89445c78f7a4c5b440a1ac9a82738ef890a
-
SSDEEP
12288:jnXw8sVQb1VvlUZvMFLTo+7In3HkYy53/SIl:jnXr5lUZveTo4KyhSa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 027cda0c85403dd8093a8d49f4f251c41bf6641ce824ae88aac760407a2d8f88
Files
-
027cda0c85403dd8093a8d49f4f251c41bf6641ce824ae88aac760407a2d8f88.exe windows:5 windows x86 arch:x86
08dc2cb4c55992e9d6a2d10aa35ec3b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemTime
SystemTimeToFileTime
LoadLibraryW
GetFileType
SetFilePointer
WriteFile
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateFileA
LocalFileTimeToFileTime
LocalFree
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
RaiseException
SetLastError
SetThreadAffinityMask
GetCurrentThread
QueryPerformanceCounter
OpenFileMappingW
Sleep
SetEvent
ExitProcess
GetSystemTimeAsFileTime
CreateEventW
CreateMutexW
VirtualFreeEx
InterlockedDecrement
OutputDebugStringW
DecodePointer
MapViewOfFileEx
GetBinaryTypeW
ProcessIdToSessionId
GetFileSizeEx
SetFilePointerEx
FormatMessageW
TlsSetValue
HeapLock
ReleaseMutex
HeapWalk
TlsAlloc
TlsGetValue
TlsFree
HeapUnlock
OpenThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetACP
GetStdHandle
GetCommandLineW
GetCommandLineA
FreeLibraryAndExitThread
ExitThread
GetModuleHandleExW
RtlUnwind
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
GetCPInfo
GetStringTypeW
LCMapStringW
EncodePointer
ReadFile
GetCurrentProcess
OpenProcess
TerminateProcess
lstrcmpiW
WaitForSingleObject
CreateThread
HeapDestroy
FindClose
FindNextFileW
SetFileAttributesW
GetLastError
CreateDirectoryW
EnterCriticalSection
LeaveCriticalSection
CreateProcessW
InitializeCriticalSection
DeleteCriticalSection
FreeLibrary
LoadLibraryExW
GetProcAddress
GetModuleFileNameW
GetModuleHandleW
GetCurrentProcessId
CloseHandle
DeviceIoControl
CreateFileW
DeleteFileW
WideCharToMultiByte
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InterlockedIncrement
WriteConsoleW
user32
SetForegroundWindow
AttachThreadInput
GetForegroundWindow
DispatchMessageW
TranslateMessage
PeekMessageW
GetWindowThreadProcessId
GetDC
ScreenToClient
GetCursorPos
PostMessageW
GetMessageW
DefWindowProcW
DestroyWindow
IsWindow
UnregisterClassW
RegisterClassExW
GetClassInfoExW
LoadCursorW
CreateWindowExW
SetWindowLongW
GetWindowLongW
CallWindowProcW
RegisterWindowMessageW
SendMessageW
PostQuitMessage
FindWindowW
GetKeyState
SetFocus
SetParent
KillTimer
SetTimer
CharNextW
SetWindowPos
GetParent
SetActiveWindow
ShowWindow
gdi32
GetDeviceCaps
advapi32
RegQueryValueExA
ConvertSidToStringSidW
GetUserNameW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegDeleteKeyW
RegQueryValueExW
RegEnumKeyExW
GetTokenInformation
OpenProcessToken
RegQueryInfoKeyW
RegCloseKey
RegOpenKeyExW
shell32
DragQueryFileW
SHFileOperationW
SHGetFolderPathW
CommandLineToArgvW
ole32
RevokeDragDrop
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
oleaut32
SysFreeString
VarUI4FromStr
SysAllocString
shlwapi
StrStrIA
SHDeleteKeyW
PathIsRootW
PathRemoveFileSpecW
PathAddBackslashW
PathIsDirectoryW
PathFileExistsW
SHGetValueW
PathAppendW
PathFindFileNameW
PathCombineW
SHSetValueW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
psapi
GetProcessImageFileNameW
Exports
Exports
??0ShellResourceRequestDetails@@QAE@XZ
??1ShellResourceRequestDetails@@QAE@XZ
??4ShellResourceRequestDetails@@QAEAAU0@ABU0@@Z
Sections
.text Size: 293KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE