e:\Office\bank\him\every\Stand\Him\thousandbread.pdb
Static task
static1
Behavioral task
behavioral1
Sample
abd8bd430078f96c2be22e6bbb1ed4bd.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
abd8bd430078f96c2be22e6bbb1ed4bd.exe
Resource
win10v2004-20240226-en
General
-
Target
abd8bd430078f96c2be22e6bbb1ed4bd
-
Size
477KB
-
MD5
abd8bd430078f96c2be22e6bbb1ed4bd
-
SHA1
d49df07b7717a9c315803ad9c26ea27ea23054f3
-
SHA256
3382d6512cf45347971c6baa5a5f2b2ca76a1710cc32185394313c2dd1c22026
-
SHA512
a3cdadeb5c4335cab8d159177198469da41c87b4d2fb125c998a20298cd7177b7a7843adc6fd2a20a46a8d36c4431076ce641b9b08304d23ca2275870bf0443a
-
SSDEEP
6144:XcNeplPhyklC/2jZPLBhMZFQ0ajujAc4YVCa5aSUHbZLfj5m1K1O3BkG8W3OY2VQ:hplDWOBhNY57aS2tf5r838WqV2B8WDp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abd8bd430078f96c2be22e6bbb1ed4bd
Files
-
abd8bd430078f96c2be22e6bbb1ed4bd.exe windows:4 windows x86 arch:x86
a033a329fbac4ad9aa9416e222d37867
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapAlloc
HeapFree
HeapReAlloc
GetProcessHeap
RaiseException
RtlUnwind
HeapSize
ExitProcess
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
GetStdHandle
GetModuleFileNameA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
InterlockedExchange
GetModuleHandleA
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
LoadLibraryA
GetVersionExA
GetThreadLocale
GlobalFlags
lstrcmpW
GetCurrentThreadId
CloseHandle
MultiByteToWideChar
GetVersion
InterlockedIncrement
FreeLibrary
InterlockedDecrement
GetModuleHandleW
GetProcAddress
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
WideCharToMultiByte
GetCurrentProcessId
GetModuleFileNameW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
FindResourceW
LoadResource
LockResource
SizeofResource
lstrlenW
GetLastError
SetLastError
VirtualProtect
LocalAlloc
GetFileType
SetTapeParameters
user32
PostQuitMessage
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
DestroyMenu
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
GetWindowTextW
SetWindowTextW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
UnregisterClassA
gdi32
TextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
RectVisible
PtVisible
GetStockObject
SetRectRgn
SetMapMode
RestoreDC
SaveDC
ExtTextOutW
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
EndDoc
GetTextExtentPoint32W
CombineRgn
PatBlt
AbortDoc
GetTextMetricsW
SetPixel
CreateCompatibleBitmap
SetAbortProc
StretchBlt
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
oleaut32
VariantInit
VariantClear
VariantChangeType
usp10
ScriptShape
ScriptApplyDigitSubstitution
ScriptPlace
ScriptTextOut
ScriptXtoCP
ScriptString_pSize
ScriptStringAnalyse
ScriptStringValidate
ScriptCPtoX
ScriptItemize
ScriptGetProperties
ScriptApplyLogicalWidth
ScriptGetCMap
ScriptStringGetLogicalWidths
ScriptStringXtoCP
ScriptString_pLogAttr
ScriptBreak
ScriptLayout
ScriptStringFree
ScriptJustify
ScriptRecordDigitSubstitution
ScriptString_pcOutChars
ScriptCacheGetHeight
ScriptStringGetOrder
ScriptFreeCache
ScriptStringOut
ScriptStringCPtoX
ScriptIsComplex
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ