e:\LSU-COM-JOB1\tvsu\Output\tvsu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
03bf31d9d6d7a3a6ec71096173b4bc3c27eb89709b242ff06e5e136f08f800c6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03bf31d9d6d7a3a6ec71096173b4bc3c27eb89709b242ff06e5e136f08f800c6.exe
Resource
win10v2004-20240221-en
General
-
Target
03bf31d9d6d7a3a6ec71096173b4bc3c27eb89709b242ff06e5e136f08f800c6
-
Size
1011KB
-
MD5
5efa9d0e4bb8112b9f18f6212e988753
-
SHA1
1c7e0c7d34afeb103e70953f7e3b3da8be967715
-
SHA256
03bf31d9d6d7a3a6ec71096173b4bc3c27eb89709b242ff06e5e136f08f800c6
-
SHA512
e26947148aceaef2c36ff0649ce96dbe920f4c8a7f04c64fb0df776ced7ded4e15fbaf1c3269710df75385a458f4dd6f31f83d79ed8d5510f16e23207feff784
-
SSDEEP
24576:r29ND2tIARNx3cHWhK0xmx//TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:r0D2tIARNxDs0IdLNiXicJFFRGNzj3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03bf31d9d6d7a3a6ec71096173b4bc3c27eb89709b242ff06e5e136f08f800c6
Files
-
03bf31d9d6d7a3a6ec71096173b4bc3c27eb89709b242ff06e5e136f08f800c6.exe windows:6 windows x86 arch:x86
c5b99cd17c52fa61ed7f12d60666667a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalFree
LoadLibraryW
LoadResource
FindResourceW
GlobalLock
OpenMutexW
GlobalUnlock
MulDiv
SetUnhandledExceptionFilter
DecodePointer
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
GetProcessHeap
Process32FirstW
SetStdHandle
LCMapStringW
CompareStringW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
GlobalAlloc
Process32NextW
GetLastError
Sleep
CreateToolhelp32Snapshot
FreeResource
GetVersionExW
WaitForSingleObject
CreateMutexW
GetCurrentProcess
SizeofResource
GetCurrentProcessId
CreateFileW
WriteFile
FreeLibrary
GetProcAddress
CloseHandle
GetVersionExA
LoadLibraryA
OpenProcess
GetStringTypeW
TerminateProcess
FindFirstFileExW
WriteConsoleW
FindClose
GetFileType
HeapAlloc
HeapFree
GetACP
GetModuleHandleExW
ExitProcess
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameW
GetStdHandle
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
user32
GetDesktopWindow
PostQuitMessage
KillTimer
GetClientRect
ReleaseDC
FindWindowW
TranslateMessage
SetTimer
DispatchMessageW
UpdateWindow
EndPaint
BeginPaint
ShowWindow
SetWindowLongW
LoadStringW
GetMessageW
CreateDialogParamW
DestroyWindow
GetDC
SetWindowPos
MessageBoxW
SendMessageW
gdi32
GetDeviceCaps
advapi32
RegCloseKey
EqualSid
AllocateAndInitializeSid
OpenProcessToken
FreeSid
RegOpenKeyExW
RegGetValueW
GetUserNameW
LookupAccountSidW
RegQueryValueExW
GetTokenInformation
shell32
ShellExecuteExW
ole32
CreateStreamOnHGlobal
shlwapi
StrCmpW
gdiplus
GdiplusStartup
GdiplusShutdown
GdipLoadImageFromStream
GdipDeleteFont
GdipDeleteGraphics
GdipCloneBrush
GdipCreateFromHDC
GdipDrawString
GdipFree
GdipCreateSolidFill
GdipCreateFont
GdipDisposeImage
GdipDrawImageRectI
GdipAlloc
GdipDeleteBrush
GdipCloneImage
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
Exports
Exports
KillProcess
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 326KB - Virtual size: 326KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE