C:\test.pdb
Static task
static1
Behavioral task
behavioral1
Sample
abcf43244787603e3d99938fb550511c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abcf43244787603e3d99938fb550511c.exe
Resource
win10v2004-20240226-en
General
-
Target
abcf43244787603e3d99938fb550511c
-
Size
78KB
-
MD5
abcf43244787603e3d99938fb550511c
-
SHA1
e7f813e609b4ebdc0370569da2c5b334d34a6173
-
SHA256
b1340bc80b73f5cfbd025ba9aaf6e5ac9827d57f27c599f16802b4f0924dba33
-
SHA512
772c2f3b2adfb62bca4e6538111addd7e1b1f036382874c95df3eecfd8ab159e4fdb09e7c15aa16ef73adc443d3de581076cdba195ddc40210901f285ff0c392
-
SSDEEP
1536:TFx+Rp1hjeFaI+UP7FNzISCaJdZUCPvo4Atfi/4kV0CSJZrONK0VLjjp:nIeFTLjzt7Zo4giwkFcZriK0l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abcf43244787603e3d99938fb550511c
Files
-
abcf43244787603e3d99938fb550511c.exe windows:5 windows x86 arch:x86
5aaf26a2358a0941361cbe5e034d06aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
strtoul
strrchr
strstr
memset
memcpy
_except_handler3
shlwapi
SHDeleteKeyA
SHSetValueA
SHGetValueA
SHDeleteValueA
PathFileExistsA
psapi
GetModuleFileNameExA
kernel32
WriteFile
ReadFile
GetLastError
VirtualAlloc
DeviceIoControl
CloseHandle
ExitProcess
lstrlenA
VirtualQuery
WaitForSingleObject
GetCommandLineA
OpenProcess
Sleep
CreateEventA
GetSystemDirectoryA
lstrcatA
MultiByteToWideChar
lstrcmpiA
GetProcAddress
CopyFileA
LoadLibraryA
SetNamedPipeHandleState
VirtualFree
lstrcmpiW
GetModuleHandleA
VirtualProtect
GetVersionExA
GetTempPathA
lstrcpyW
DeleteFileA
lstrcpyA
FreeLibrary
CreateProcessA
SetFilePointer
GetFileSize
FindResourceA
FreeResource
SetEndOfFile
LoadResource
GetCurrentProcess
Process32First
GetSystemTimeAsFileTime
SizeofResource
GetExitCodeProcess
Process32Next
LockResource
CreateToolhelp32Snapshot
LocalFree
SetEvent
ExitThread
lstrlenW
OpenEventA
DuplicateHandle
GetCurrentProcessId
GetSystemTime
CreateThread
CreateFileA
GetModuleFileNameA
user32
FindWindowA
PostMessageA
SendMessageA
wsprintfW
wsprintfA
advapi32
ControlService
OpenSCManagerA
QueryServiceStatus
StartServiceA
CreateServiceA
RegQueryValueExA
CloseServiceHandle
OpenServiceA
RegOpenKeyA
RegCloseKey
GetNamedSecurityInfoA
AdjustTokenPrivileges
BuildExplicitAccessWithNameA
LookupPrivilegeValueA
SetNamedSecurityInfoA
SetEntriesInAclA
OpenProcessToken
shell32
ShellExecuteA
Exports
Exports
CoCreateInstance
CoGetMalloc
CoInitializeEx
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
GradientFill
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ