G:\MyProj\PPProj\Release\PPClient.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7c7a54b63aa74a928251d3efc3643d37.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c7a54b63aa74a928251d3efc3643d37.exe
Resource
win10v2004-20231215-en
General
-
Target
7c7a54b63aa74a928251d3efc3643d37
-
Size
127KB
-
MD5
7c7a54b63aa74a928251d3efc3643d37
-
SHA1
01f3e5c913a44a31155fb22153e65c854101c702
-
SHA256
0c2b042692881e82d0d8190f5b8569aa43012a5e748c8831b343fdfb179e60b5
-
SHA512
927af99b1ef639fcd3e5f567e4a7c241085c713a5178c028fb362c964127d2a5d0eee5a0f4907f0c8c7368deb10160141c9909f31f2da9753b8f4fc64af8edc2
-
SSDEEP
1536:PzU0warfN8RYOH1wv1YHAwBHTw6USAAzSZfjmpevCrD/huc5uHQ9:AorfMo6hBe6fcc5uHQ9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7c7a54b63aa74a928251d3efc3643d37
Files
-
7c7a54b63aa74a928251d3efc3643d37.exe windows:5 windows x86 arch:x86
027f0ccabaa869d6756b799080a80f88
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
GetFileAttributesA
CreateDirectoryA
WriteFile
Sleep
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
SetLastError
GetModuleFileNameA
ReadFile
SetFilePointer
CreateProcessA
GetComputerNameA
GetTempPathA
GetTempFileNameA
lstrcmpiW
lstrcatW
lstrcpyW
GetVolumeInformationW
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
ExitProcess
HeapCreate
LCMapStringW
MultiByteToWideChar
LCMapStringA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
GetOEMCP
GetACP
CloseHandle
InterlockedIncrement
GetCPInfo
FindResourceExA
FindResourceA
SizeofResource
LockResource
LoadResource
RtlUnwind
GetStartupInfoA
FlushFileBuffers
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetLastError
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
InterlockedCompareExchange
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
GetProcessHeap
HeapSize
HeapReAlloc
InterlockedDecrement
WideCharToMultiByte
GetProcAddress
GetModuleHandleA
OpenProcess
GetSystemInfo
GlobalMemoryStatus
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
SetHandleCount
user32
PostQuitMessage
LoadIconA
TranslateAcceleratorA
UnregisterClassA
EndPaint
BeginPaint
TranslateMessage
DispatchMessageA
GetMessageA
LoadStringA
KillTimer
SetTimer
CallWindowProcA
RegisterClassExA
LoadCursorA
GetClassInfoExA
DefWindowProcA
PostMessageA
DestroyWindow
CreateWindowExA
GetWindowLongA
SetWindowLongA
LoadAcceleratorsA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetSpecialFolderPathW
ole32
CoInitialize
CoCreateInstance
CoSetProxyBlanket
oleaut32
VariantClear
VariantInit
SysAllocString
SysFreeString
shlwapi
StrStrW
StrChrW
wvnsprintfW
StrCpyNW
ws2_32
socket
select
WSAAsyncSelect
WSAAsyncGetHostByName
send
recvfrom
recv
connect
closesocket
bind
inet_addr
htonl
accept
WSASetLastError
WSAStartup
WSAGetLastError
htons
sendto
psapi
EnumProcessModules
GetModuleFileNameExA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ