d:\dbs\el\oc\target\x86\ship\click2run\x-none\perfboost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab176f525769da0038f76a534e51637b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab176f525769da0038f76a534e51637b.exe
Resource
win10v2004-20240226-en
General
-
Target
ab176f525769da0038f76a534e51637b
-
Size
2.4MB
-
MD5
ab176f525769da0038f76a534e51637b
-
SHA1
052a1bcd5cb1301d0cf1770d1c1c53718a38173f
-
SHA256
961ad950effc67413b6235084d881b224d99ecda1703fadf679b79d299bad927
-
SHA512
cfe41100948541110b9a4da4af268507700c746e3f43329e6a971b0e9ce660f7ed5c2940e62aac6ec97e0e619beb9a58987a6db06d8cd45064fc0cd3febb9017
-
SSDEEP
49152:NBQCKMN7pXRKNnpT0g7mM+M6RkMkIM7I0672ljrZqhaK6zbfqdl:D9Nn9M+M6RkMkIM73x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab176f525769da0038f76a534e51637b
Files
-
ab176f525769da0038f76a534e51637b.exe windows:6 windows x86 arch:x86
4b540122e47bd952474dff889d5cdec9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
GetTokenInformation
OpenProcessToken
RegOpenKeyExW
RegCloseKey
IsValidSid
FreeSid
CreateWellKnownSid
EqualSid
RegGetValueW
EventWriteTransfer
EventRegister
EventUnregister
kernel32
HeapFree
CreateEventExW
GetCurrentProcess
GetModuleFileNameW
CreateMutexW
OpenEventW
Sleep
GetLastError
SetEvent
CloseHandle
GetCurrentProcessId
GetProcessHeap
QueryPerformanceFrequency
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCurrentThread
GetThreadTimes
FindNextFileW
FindClose
CreateFileW
GetModuleHandleA
GetProcAddress
SetFilePointerEx
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLCID
LCMapStringW
FreeLibrary
LocalFree
FormatMessageA
FindFirstFileExW
IsWow64Process
ReleaseSemaphore
GlobalFree
HeapAlloc
SetLastError
GetStringTypeW
GlobalMemoryStatusEx
RaiseException
LoadLibraryExW
GetModuleHandleW
GetVersionExW
InitializeCriticalSectionEx
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetTickCount64
TerminateProcess
GetModuleFileNameA
GetShortPathNameA
FindResourceW
SizeofResource
LoadResource
IsValidCodePage
FileTimeToSystemTime
FormatMessageW
GetLogicalProcessorInformation
WaitForSingleObjectEx
SignalObjectAndWait
GetProcessAffinityMask
CreateWaitableTimerW
GetCurrentThreadId
QueryDepthSList
TryEnterCriticalSection
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
GetFileType
WriteFile
FlsAlloc
TlsAlloc
FlsFree
TlsFree
FlsGetValue
TlsGetValue
FlsSetValue
TlsSetValue
GetModuleHandleExW
K32GetProcessMemoryInfo
LoadLibraryExA
VirtualQuery
GetSystemInfo
WriteConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
EnumSystemLocalesW
IsValidLocale
GetACP
DuplicateHandle
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
GetTickCount
GetLocaleInfoW
GetCPInfo
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
InterlockedFlushSList
CreateTimerQueue
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
FreeLibraryAndExitThread
VirtualAlloc
VirtualProtect
VirtualFree
UnregisterWaitEx
LoadLibraryW
HeapSize
HeapReAlloc
GetStdHandle
ExitProcess
ole32
StringFromGUID2
CoCreateGuid
Sections
.text Size: 329KB - Virtual size: 329KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c2r Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ