d:\projects\fdrv2\release\downloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8eeb2bdf942154221ad12ce5bd2c382b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8eeb2bdf942154221ad12ce5bd2c382b.exe
Resource
win10v2004-20231215-en
General
-
Target
8eeb2bdf942154221ad12ce5bd2c382b
-
Size
165KB
-
MD5
8eeb2bdf942154221ad12ce5bd2c382b
-
SHA1
25aece663d1b4b5286928e531979992172ae2fac
-
SHA256
e63a012da7e6150328bb473b672fc7ccfd632015e38a464f8db294e89c4e2eff
-
SHA512
69e38ac569319b650c80d716d448d27200ab4362cc693bf766661471d712f03fabd23122c9ac71206ff50c58e95c343bdc1290162ce4b17a24da17d8036ee3ae
-
SSDEEP
3072:pg7fJVaISj52aq34UzWf5nmyUWhzN/M0ugHpb6XW:e7fJVaz5hEWlmxWhm1gJuG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8eeb2bdf942154221ad12ce5bd2c382b
Files
-
8eeb2bdf942154221ad12ce5bd2c382b.exe windows:5 windows x86 arch:x86
451178a529afa0028ca0da670b036550
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wsock32
connect
WSAStartup
htons
shutdown
socket
closesocket
send
shlwapi
StrStrW
StrRChrW
kernel32
lstrlenA
FormatMessageW
GetLastError
LocalAlloc
LocalFree
lstrcpyW
GetFileSize
SetFilePointer
WriteFile
ReadFile
CreateFileW
GetCurrentDirectoryW
GetFileTime
CloseHandle
SetFileAttributesW
SetErrorMode
GetNativeSystemInfo
GetVersionExW
lstrlenW
SetCurrentDirectoryW
GetShortPathNameW
WinExec
lstrcpynW
lstrcmpW
ExitProcess
GetSystemDirectoryW
WideCharToMultiByte
GetModuleFileNameW
MultiByteToWideChar
GetTempPathW
GetLocalTime
GetSystemInfo
GetWindowsDirectoryW
GetVolumeInformationW
GetModuleHandleA
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
GetModuleHandleW
UnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
HeapSize
HeapAlloc
RaiseException
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
VirtualAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
wsprintfW
GetSystemMetrics
IsCharAlphaW
advapi32
RegCloseKey
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
StartServiceW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
CreateServiceW
RegSetValueExW
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ