C:\ged.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aae688a16a5bd098f7b696c2dcdb713c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aae688a16a5bd098f7b696c2dcdb713c.exe
Resource
win10v2004-20240226-en
General
-
Target
aae688a16a5bd098f7b696c2dcdb713c
-
Size
321KB
-
MD5
aae688a16a5bd098f7b696c2dcdb713c
-
SHA1
a4b3576feb789f5c58da2178e3b3c40f7ef185ad
-
SHA256
2cba8012f3deb21e3f361d5a3f07cc794b6e18e63b07c98aa2cbd78233cee70e
-
SHA512
4f43d0666c68838db0d42500df306a2a9663865aa749fb73c3d295ed890394533ec571b3bb943e206f3285fd797aa2643efa0271983d2de9f8c9b4708747295f
-
SSDEEP
6144:taJZA5HBB2qJI+LY5MaW9vn3/rRAS7Lf4ZLyXqSlrFzBnmytldWS:gJZANLdHNjcyHLhm2ld
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource aae688a16a5bd098f7b696c2dcdb713c
Files
-
aae688a16a5bd098f7b696c2dcdb713c.exe windows:5 windows x86 arch:x86
7780eb9cc098185992365509d7637fd7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLongPathNameW
GetUserDefaultLangID
AddRefActCtx
GetCPInfoExW
WriteConsoleInputA
ReadConsoleInputW
GetConsoleAliasW
SetCommTimeouts
SetConsoleCP
VerifyVersionInfoA
WaitNamedPipeA
CreateMutexA
WriteConsoleA
GetLastError
CreateFileA
WritePrivateProfileSectionW
GetPrivateProfileSectionA
EnumDateFormatsExA
SetStdHandle
LoadLibraryW
RequestDeviceWakeup
FindFirstVolumeA
ReadFile
BuildCommDCBA
VerLanguageNameA
SetFileApisToANSI
WriteProcessMemory
ResetEvent
Sleep
EndUpdateResourceW
GetCPInfo
SetConsoleCtrlHandler
SetConsoleTitleA
SetFilePointer
GetCurrentConsoleFont
EraseTape
AttachConsole
GetConsoleAliasesLengthW
ZombifyActCtx
ReadConsoleOutputW
GetSystemWindowsDirectoryA
GetStringTypeW
BuildCommDCBAndTimeoutsA
HeapAlloc
HeapLock
GetAtomNameW
GlobalSize
HeapValidate
GetGeoInfoA
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CreateThread
GetVersionExA
GetACP
WaitForMultipleObjects
WaitForSingleObject
GetSystemPowerStatus
WriteConsoleOutputCharacterA
LocalAlloc
GetMailslotInfo
SetEnvironmentVariableW
GetFileAttributesExA
GetComputerNameW
CommConfigDialogA
GetConsoleWindow
PostQueuedCompletionStatus
GetDiskFreeSpaceW
LeaveCriticalSection
EnumDateFormatsA
CopyFileA
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
GetStringTypeA
LCMapStringA
LCMapStringW
CloseHandle
user32
GetAltTabInfoW
gdi32
GetCharWidth32A
advapi32
AdjustTokenPrivileges
BackupEventLogA
Exports
Exports
@GetSecondVice@0
Sections
.text Size: 175KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 39.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ