d:\Works\ByShell_Up19\WinStart\Release\WinStart.pdb
Static task
static1
Behavioral task
behavioral1
Sample
801e2a6fde8fe4bbf0403fea557c2435.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
801e2a6fde8fe4bbf0403fea557c2435.exe
Resource
win10v2004-20231222-en
General
-
Target
801e2a6fde8fe4bbf0403fea557c2435
-
Size
205KB
-
MD5
801e2a6fde8fe4bbf0403fea557c2435
-
SHA1
973ed2f88d31e7f154a7feabc98ff888d39fa03d
-
SHA256
a956b33cfab8f4aad287f05b1168c736a1310c5048907c025838f1c1d2b62652
-
SHA512
e7cd43ca076e4e98217802ce4e5937760c4c0c26d1c91dc1c6bf58952c1e545ab3f144cf3631f48f7e324f3c420ead71be7ac6da14387e8460a97c67dd9197cc
-
SSDEEP
3072:Eq/9pQGqVlRStBMYiuaTyI1lTL0FpKyKpbe2if5lAZxj:h9pvqxStcph1NLO0yQSmZl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 801e2a6fde8fe4bbf0403fea557c2435
Files
-
801e2a6fde8fe4bbf0403fea557c2435.exe windows:4 windows x86 arch:x86
c88fa953023734f7156c298cb28cc4c2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LockResource
GlobalAlloc
LoadResource
SizeofResource
FindResourceW
GetSystemDirectoryA
ResumeThread
CreateProcessW
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatW
lstrcpyW
GetEnvironmentVariableW
GetShortPathNameW
GetModuleFileNameW
CreateFileA
FindResourceA
SetFilePointer
OutputDebugStringA
GetTimeFormatA
GetLocalTime
SetCurrentDirectoryA
DeleteFileA
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
Sleep
CopyFileA
GetModuleFileNameA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetSystemInfo
VirtualProtect
SetEndOfFile
GetCPInfo
GetOEMCP
GetStringTypeW
CreateFileW
WriteFile
GlobalFree
GetCurrentProcess
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetLocaleInfoA
GetACP
GetVersionExA
LoadLibraryA
GetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
GetTickCount
ExitProcess
RtlUnwind
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualQuery
ReadFile
TerminateProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetStdHandle
FlushFileBuffers
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
InterlockedExchange
user32
RegisterClassExW
CreateWindowExW
ShowWindow
UpdateWindow
DefWindowProcW
advapi32
RegRestoreKeyA
RegCreateKeyA
RegOpenKeyExA
RegSaveKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ