chrome_proxy.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9e368e81b2729b4d57b4070c225c83cec21a44ea8c8cb38a40238c5d6e959a49.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9e368e81b2729b4d57b4070c225c83cec21a44ea8c8cb38a40238c5d6e959a49.exe
Resource
win10v2004-20240221-en
General
-
Target
9e368e81b2729b4d57b4070c225c83cec21a44ea8c8cb38a40238c5d6e959a49
-
Size
1.1MB
-
MD5
03424bfac28177098f74e0991859671d
-
SHA1
5685e9cb751c6440b052495eb3c1def2a7abdee0
-
SHA256
9e368e81b2729b4d57b4070c225c83cec21a44ea8c8cb38a40238c5d6e959a49
-
SHA512
52e56c9bb7d55aa14686f379e242cae2ca3a3c0a32493391939e4a0e755958b0eb5ba1bbd6cab71d390d1b0986e84c2bed6faacfdb34c1aaa5eb6f446dfb7148
-
SSDEEP
12288:9UidYdHRpDV+9nOQQ5m++Vb96NVswaBg7JLm3nG9JPFL1uLZCow5Ea:0pRpDKOzm+Q96NSyJLmXGbL1uVCd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9e368e81b2729b4d57b4070c225c83cec21a44ea8c8cb38a40238c5d6e959a49
Files
-
9e368e81b2729b4d57b4070c225c83cec21a44ea8c8cb38a40238c5d6e959a49.exe windows:5 windows x64 arch:x64
432e7c6d00cf1f40178db7ff9e5f7b9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
progwrp
AcquireSRWLockExclusive
DeleteProcThreadAttributeList
EncodePointer
FindFirstFileExW
GetProductInfo
InitOnceExecuteOnce
InitializeProcThreadAttributeList
QueryThreadCycleTime
ReleaseSRWLockExclusive
SHGetKnownFolderPath
SleepConditionVariableSRW
TLSInit_DllMain_ThreadAttach
TryAcquireSRWLockExclusive
UpdateProcThreadAttribute
WakeAllConditionVariable
WakeConditionVariable
advapi32
CreateProcessAsUserW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
SystemFunction036
kernel32
AssignProcessToJobObject
CloseHandle
CompareStringW
CreateEventW
CreateFileW
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
DuplicateHandle
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
ExitThread
ExpandEnvironmentStringsW
FindClose
FindNextFileW
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesW
GetFileSizeEx
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNativeSystemInfo
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessId
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetThreadId
GetThreadPriority
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExW
GetWindowsDirectoryW
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
IsWow64Process
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LocalFree
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadConsoleW
ReadFile
ResetEvent
SetEnvironmentVariableW
SetEvent
SetFilePointerEx
SetHandleInformation
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SwitchToThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnregisterWaitEx
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrlenA
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
user32
AllowSetForegroundWindow
GetActiveWindow
shell32
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteExW
winmm
timeGetTime
ole32
CoInitializeEx
CoRegisterInitializeSpy
CoRevokeInitializeSpy
CoTaskMemFree
CoUninitialize
ntdll
RtlCaptureContext
RtlCaptureStackBackTrace
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
Exports
Exports
GetHandleVerifier
Sections
.text Size: 851KB - Virtual size: 851KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gxfg Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.retplne Size: 512B - Virtual size: 140B
.tls Size: 512B - Virtual size: 425B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ