C:\b\c\b\win_x64_archive\src\out\Release_x64\initialexe\chrome.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
129d915901f92a73b59e310a8324eef7a8047fefa36a4656dc20dcb3415c78b2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
129d915901f92a73b59e310a8324eef7a8047fefa36a4656dc20dcb3415c78b2.exe
Resource
win10v2004-20240221-en
General
-
Target
129d915901f92a73b59e310a8324eef7a8047fefa36a4656dc20dcb3415c78b2
-
Size
4.7MB
-
MD5
d8872c68d9cebb8b50073b1539906da9
-
SHA1
ad1022b357f484c38bb6d769b3a0c75921b50582
-
SHA256
129d915901f92a73b59e310a8324eef7a8047fefa36a4656dc20dcb3415c78b2
-
SHA512
f20328cd2285a82804d4534c1e126eaf4a7a94381ab9cfa0917595c091bc7c131288cf221eefd52e44c893c4a6ef5f3b28a90174f3c10a339a4e0ed9545ed75e
-
SSDEEP
49152:xyHE1eAaAZjs2kFDUasnrAKbcUKiIiolLMmGlB4MZIRbmxEWLknMFvf7ft471G72:3NNZoSB0UKiIiolgm8VPUhP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 129d915901f92a73b59e310a8324eef7a8047fefa36a4656dc20dcb3415c78b2
Files
-
129d915901f92a73b59e310a8324eef7a8047fefa36a4656dc20dcb3415c78b2.exe windows:5 windows x64 arch:x64
c8a1da3a0ab13b6e65f5f60bdcd7a9ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
chrome_elf
GetInstallDetailsPayload
SignalInitializeCrashReporting
SignalChromeElf
advapi32
ImpersonateNamedPipeClient
GetSecurityInfo
SetEntriesInAclW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
SystemFunction036
OpenProcessToken
GetTokenInformation
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
LookupPrivilegeValueW
CreateProcessAsUserW
SetThreadToken
ConvertSidToStringSidW
gdi32
SelectObject
CreateFontIndirectW
CreateCompatibleDC
DeleteDC
DeleteObject
EnumFontFamiliesExW
GetCharABCWidthsW
GetFontData
GetGlyphOutlineW
GetOutlineTextMetricsW
GetFontUnicodeRanges
GetGlyphIndicesW
GetTextExtentPointI
AddFontMemResourceEx
RemoveFontMemResourceEx
SetBkMode
SetGraphicsMode
SetTextColor
SetTextAlign
GetTextMetricsW
SetWorldTransform
CreateDIBSection
ExtTextOutW
GetTextFaceW
GdiFlush
kernel32
GetThreadLocale
Wow64GetThreadContext
GetSystemDefaultLCID
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetLastError
SetLastError
CreateEventW
GetCurrentThreadId
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetProcessId
SetCurrentDirectoryW
SetProcessShutdownParameters
LoadLibraryExW
VirtualAlloc
VirtualFree
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
HeapCreate
HeapDestroy
GetCurrentDirectoryW
CreateFileW
DeleteFileW
WriteFile
OutputDebugStringA
CloseHandle
GetCurrentProcessId
GetLocalTime
GetTickCount
FormatMessageA
QueryPerformanceCounter
QueryPerformanceFrequency
ReleaseSRWLockExclusive
Sleep
GetCurrentThread
SetThreadPriority
GetThreadPriority
GetSystemTimeAsFileTime
QueryThreadCycleTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineW
LocalFree
GetModuleHandleW
ExpandEnvironmentStringsW
GetVersionExW
GetNativeSystemInfo
TerminateProcess
GetExitCodeProcess
OpenProcess
FlushFileBuffers
GetFileInformationByHandle
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointerEx
VirtualQuery
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
IsDebuggerPresent
RaiseException
CreateThread
GetThreadId
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
AcquireSRWLockExclusive
GetSystemDirectoryW
GetWindowsDirectoryW
CreateDirectoryW
GetFileAttributesW
GetLongPathNameW
QueryDosDeviceW
RemoveDirectoryW
SetFileAttributesW
GetTempPathW
MoveFileW
ReplaceFileW
UnregisterWaitEx
RegisterWaitForSingleObject
GetUserDefaultLangID
TlsGetValue
GetModuleHandleExW
GetProcessTimes
LoadLibraryW
FlushViewOfFile
FindClose
FindFirstFileExW
FindNextFileW
TlsAlloc
TlsSetValue
TlsFree
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
SetInformationJobObject
GetSystemInfo
VirtualQueryEx
HeapSetInformation
SetEvent
ResetEvent
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
DecodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateProcessW
ReleaseSemaphore
CreateSemaphoreW
InitOnceExecuteOnce
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTimeZoneInformation
OutputDebugStringW
GetComputerNameExW
LockFileEx
UnlockFileEx
SetConsoleCtrlHandler
TerminateJobObject
GetUserDefaultLCID
WriteProcessMemory
AssignProcessToJobObject
GetFileType
SetHandleInformation
ProcessIdToSessionId
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
CreateMutexW
VirtualProtectEx
QueryFullProcessImageNameW
VirtualAllocEx
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
CreateRemoteThread
ReadProcessMemory
DebugBreak
lstrlenW
SearchPathW
VirtualProtect
LoadLibraryExA
GetThreadContext
SuspendThread
SleepEx
GetVersion
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
IsWow64Process
GetFileInformationByHandleEx
DisconnectNamedPipe
ConnectNamedPipe
ResumeThread
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetStdHandle
GetACP
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
PeekNamedPipe
GetDriveTypeW
RtlPcToFileHeader
RtlUnwindEx
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetStringTypeW
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
FreeLibrary
psapi
GetMappedFileNameW
GetProcessMemoryInfo
GetPerformanceInfo
shell32
SHGetKnownFolderPath
SHGetFolderPathW
CommandLineToArgvW
shlwapi
PathMatchSpecW
user32
GetMessageW
RegisterClassW
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
TranslateMessage
DispatchMessageW
PostMessageW
CloseDesktop
SystemParametersInfoW
wsprintfW
GetWindowThreadProcessId
AllowSetForegroundWindow
IsWindow
SendMessageTimeoutW
FindWindowExW
SetWindowLongPtrW
GetWindowLongPtrW
DestroyWindow
CreateWindowExW
UnregisterClassW
DefWindowProcW
usp10
ScriptShape
ScriptItemize
ScriptFreeCache
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetTime
winhttp
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpWriteData
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpCrackUrl
WinHttpSendRequest
Exports
Exports
GetHandleVerifier
IsSandboxedProcess
Sections
.text Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_text32 Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 739KB - Virtual size: 739KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CPADinfo Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 33B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ