Static task
static1
Behavioral task
behavioral1
Sample
debugger549.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
debugger549.exe
Resource
win10v2004-20230220-en
General
-
Target
debugger549.exe
-
Size
822KB
-
MD5
3fe8d70e6afc2e75bdaf6b0a59a738bb
-
SHA1
c3d202e5b592d09799ca1df3209a40bfdb77bee6
-
SHA256
7800794cd25aaf48943d931935a9cd98980a645881fd557a24f0444ffbbdc2e1
-
SHA512
baccee0b40c1739274be90a63981551e44562f75c020eb6ef3913f1b5750ef8957350ab80053790fbf5c0f17fe6e16db07e0f831fe73d2759bb8315a4dab14e6
-
SSDEEP
12288:S8A7zS/xGU1gG7HCkpIwS95TUO2XzUjD4LIsxWps7hAlLCu24AXUF:SjS/xGUhikpIws5gO2Xz6DTs8iqCu6U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource debugger549.exe
Files
-
debugger549.exe.exe windows x86
c3945e210b1009128598ead2a7524d0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsW
ReadConsoleOutputAttribute
CancelWaitableTimer
InterlockedCompareExchange
SetComputerNameW
AddConsoleAliasW
GetModuleHandleW
GetConsoleTitleA
TlsSetValue
GlobalAlloc
FatalAppExitW
GetStringTypeExW
HeapDestroy
GlobalFlags
DnsHostnameToComputerNameW
FindNextVolumeW
IsDBCSLeadByte
GetModuleFileNameW
CreateActCtxA
lstrlenW
ReplaceFileA
GetTempPathW
GetLargestConsoleWindowSize
GetConsoleAliasA
SetProcessAffinityMask
SetLastError
GetProcAddress
AttachConsole
VirtualAlloc
LocalLock
ReadFileEx
ResetEvent
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
DnsHostnameToComputerNameA
GetNumberFormatW
OpenEventA
FindAtomA
GetTapeParameters
GetDefaultCommConfigA
FindFirstVolumeMountPointA
GetModuleHandleA
SetLocaleInfoW
RequestWakeupLatency
GetWindowsDirectoryW
DebugBreak
EnumCalendarInfoExA
EnumSystemLocalesW
ReadConsoleA
GetConsoleAliasesLengthW
lstrlenA
SetThreadContext
GetTempFileNameW
GetLastError
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapCreate
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsFree
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
gdi32
GetCharABCWidthsFloatW
GetCharWidthW
EnumFontsA
GetCharABCWidthsI
advapi32
MapGenericMask
Sections
.text Size: 685KB - Virtual size: 684KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 4.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ