d:\Proiecte\nBinder\unBin\unBin3\Unbin3\Unbin3\Release\Unbin3.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7e886622aa732494f6b6ce5bc30a704e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e886622aa732494f6b6ce5bc30a704e.exe
Resource
win10v2004-20231215-en
General
-
Target
7e886622aa732494f6b6ce5bc30a704e
-
Size
191KB
-
MD5
7e886622aa732494f6b6ce5bc30a704e
-
SHA1
115e35188b8db8e16bca7c7be757155519ca43cd
-
SHA256
e8fe848cb0aca698861020ff300da7fa9155e71a153b4bb3aa6ce51fed9c97aa
-
SHA512
d49f475c7af5dae87c7ca7d14f651ca7ddb425434b06ff9bd5bc6fd7049c23767427d37a378e4a120bf33151a689f43d65ac2a02cd32176872420caf1f689fb8
-
SSDEEP
3072:9uSdI52Ftan+LVlLWYxhM/QwaPrymCGQIN9ugrmmdVwuNZrAC2Cwsg/OW46tZkeX:9uSxI+JFxmaPrfCGQIN9f6qwaSChwsgh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e886622aa732494f6b6ce5bc30a704e
Files
-
7e886622aa732494f6b6ce5bc30a704e.exe windows:4 windows x86 arch:x86
01c11ef4f4f12ca96fddb5d26564c299
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc70
ord3640
ord512
ord3140
ord1077
ord1770
ord2741
ord4996
ord3750
ord5002
ord4985
ord546
ord705
ord1081
ord1406
ord3003
ord1646
ord3445
ord4530
ord4958
ord5666
ord1272
ord4043
ord4975
ord3993
ord4671
ord4361
ord2016
ord1870
ord1523
ord1522
ord1403
ord300
ord2990
ord977
ord1784
ord3018
ord272
ord956
ord2799
ord5669
ord1472
ord1469
ord4267
ord3748
ord1273
ord4025
ord4933
ord1760
ord1755
ord5152
ord5989
ord3966
ord4986
ord3208
ord4101
ord4503
ord4063
ord1452
ord5714
ord812
ord817
ord821
ord819
ord823
ord2239
ord2223
ord2242
ord2237
ord2214
ord2216
ord2234
ord2026
ord2675
ord2020
ord1377
ord5993
ord3610
ord5991
ord3152
ord4748
ord3565
ord5815
ord1234
ord4954
ord1814
ord1508
ord1507
ord1451
ord4972
ord518
ord5007
ord5005
ord2219
ord2229
ord2227
ord2225
ord2221
ord2244
ord2232
ord1097
ord5933
ord4883
ord899
ord3614
ord5339
ord1868
ord1913
ord4107
ord5990
ord3609
ord5992
ord4322
ord3638
ord2096
ord5322
ord4349
ord4998
ord3814
ord698
ord3487
ord3832
ord982
ord561
ord256
ord957
ord4042
ord4262
ord3751
ord2461
ord3513
ord3523
ord3522
ord2352
ord2463
ord2359
ord2651
ord2529
ord4088
ord2648
ord2546
ord4854
ord2356
msvcr70
??1type_info@@UAE@XZ
_c_exit
_exit
_XcptFilter
_cexit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__security_error_handler
?terminate@@YAXXZ
_controlfp
_except_handler3
_onexit
__dllonexit
__CxxFrameHandler
strrchr
isupper
_errno
perror
memcmp
_iob
fprintf
_purecall
strcmp
_mbsrev
_mbscmp
exit
strcat
fclose
_vscprintf
fseek
fwrite
_mbslwr
fread
memset
fopen
atoi
div
_mbsstr
strcpy
strstr
strlen
malloc
free
_strrev
memmove
vsprintf
memcpy
_setmbcp
_write
_read
_open
_close
_unlink
_stat
_CxxThrowException
kernel32
FindResourceA
GetLocaleInfoA
LoadResource
WaitForSingleObject
GetCommandLineA
WideCharToMultiByte
SizeofResource
CreateProcessA
GetACP
CreateDirectoryA
InterlockedExchange
GetThreadLocale
RemoveDirectoryA
MoveFileA
LockResource
GetModuleFileNameA
GetVersionExA
CloseHandle
GetTempPathA
DeleteFileA
GetModuleHandleA
GetStartupInfoA
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
CreateFileA
user32
EnableWindow
LoadIconA
shell32
ShellExecuteA
Exports
Exports
strlwr
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 347KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ