d:\jenkins\workspace\ThunderPC\ThunderCpp_AP_Build_Pack_Thunder\thunder\build\ProductRelease\ThunderStart.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8cc763eb07fdc16d8d65478cb598e24bfa4af30b54dbe84bbd5e6a6f5fbc5c5a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8cc763eb07fdc16d8d65478cb598e24bfa4af30b54dbe84bbd5e6a6f5fbc5c5a.exe
Resource
win10v2004-20231222-en
General
-
Target
8cc763eb07fdc16d8d65478cb598e24bfa4af30b54dbe84bbd5e6a6f5fbc5c5a
-
Size
745KB
-
MD5
3d609fc3ead416be1083662e21a3de45
-
SHA1
ef4b96dad16b0cca9db49bb947b054d005d6b1ab
-
SHA256
8cc763eb07fdc16d8d65478cb598e24bfa4af30b54dbe84bbd5e6a6f5fbc5c5a
-
SHA512
c68c5d7933ccd0939251edc6c01ead3bc4c075d1bfc8f40c89a915aeccb2359620378230dd69b440ab70672c03fa62ac093617a40c14c981359a8caeb87f2bda
-
SSDEEP
12288:rx2qEbB9x657II2vu2Jt59NvjWnV7VQuqjgH5bVmfaQYQEedYbh2OR1dMk3:rx2qEx65MDt7NvAVnVmfaQYQfY22b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cc763eb07fdc16d8d65478cb598e24bfa4af30b54dbe84bbd5e6a6f5fbc5c5a
Files
-
8cc763eb07fdc16d8d65478cb598e24bfa4af30b54dbe84bbd5e6a6f5fbc5c5a.exe windows:6 windows x86 arch:x86
110ccb1ba17ad0ed0f86c6c5ce87af91
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadResource
SizeofResource
FindResourceW
LoadLibraryW
lstrcmpiW
GetPrivateProfileStringW
MultiByteToWideChar
CloseHandle
ReleaseMutex
WaitForSingleObject
CreateMutexW
GetSystemTime
FindResourceExW
LockResource
SystemTimeToTzSpecificLocalTime
OpenFileMappingW
MapViewOfFileEx
UnmapViewOfFile
LocalFree
lstrcpyW
lstrlenW
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
OpenMutexW
WaitForMultipleObjects
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
GetProcessId
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32EnumProcessModules
K32GetModuleFileNameExW
SetPriorityClass
WriteConsoleW
CreateFileW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
WriteFile
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetLastError
GetTempPathW
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
GetPrivateProfileStringA
CreateDirectoryA
ResetEvent
SetEvent
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
WritePrivateProfileStringA
lstrcpyA
GetFileAttributesA
SetStdHandle
DecodePointer
InterlockedPopEntrySList
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
EncodePointer
WideCharToMultiByte
GetVersionExA
CreateFileA
GetVolumeInformationA
lstrcatA
DeviceIoControl
user32
SetWindowPos
SetTimer
UpdateWindow
ShowWindow
PostThreadMessageW
PostMessageW
UnregisterClassW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
CharNextW
GetClientRect
GetWindowRect
MapWindowPoints
GetWindowLongW
GetDesktopWindow
GetParent
FindWindowW
GetWindow
MonitorFromWindow
DestroyWindow
GetMonitorInfoW
MessageBoxW
SendMessageTimeoutW
InvalidateRect
EndPaint
BeginPaint
KillTimer
IsWindowVisible
UpdateLayeredWindow
SendMessageW
LoadCursorW
SetWindowLongW
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
gdi32
CreateCompatibleDC
DeleteDC
CreateDIBSection
SelectObject
DeleteObject
advapi32
RegEnumKeyExW
RegCreateKeyExW
TraceEvent
GetTraceEnableLevel
GetTraceLoggerHandle
UnregisterTraceGuids
RegisterTraceGuidsW
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
shell32
ShellExecuteExW
CommandLineToArgvW
SHGetSpecialFolderPathA
ole32
OleInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CreateStreamOnHGlobal
oleaut32
VarUI4FromStr
iphlpapi
GetAdaptersInfo
ws2_32
WSAStartup
shlwapi
PathAppendW
PathCombineW
PathFileExistsW
StrStrIW
StrStrW
PathFindFileNameW
gdiplus
GdipGetImageHeight
GdipDeleteGraphics
GdipDisposeImage
GdipCloneImage
GdipDrawImageRect
GdipGetImageWidth
GdipCreateFromHDC
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipLoadImageFromStream
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ