g:\Work\Projects\Personal\HitBot\BestClick\Release\BestClick.pdb
Static task
static1
Behavioral task
behavioral1
Sample
adf58ffdd974295432f7e1f2e1a75202.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adf58ffdd974295432f7e1f2e1a75202.exe
Resource
win10v2004-20240226-en
General
-
Target
adf58ffdd974295432f7e1f2e1a75202
-
Size
172KB
-
MD5
adf58ffdd974295432f7e1f2e1a75202
-
SHA1
577fd1b424d3a0a0a94c27463b46addfe802d41a
-
SHA256
3d711164abf476b1d54d48f06688b649ce06904800a6a566377863ff91af8080
-
SHA512
797f3d53a408433942d84908beae4040c29259bc7f5e3290444c34cc3c8cde56f224a6cf1730be82d3637dc556aac5e91c0a46db131fb05b35ca0b68131e08cb
-
SSDEEP
3072:yJJBBiI+aSJLCCryfcoix9RR3tZYreA6Y+vBMbVAkJSjO+Uf/uj7zCm+loq:yJJvCtoixDZdecBRnauPG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adf58ffdd974295432f7e1f2e1a75202
Files
-
adf58ffdd974295432f7e1f2e1a75202.exe windows:4 windows x86 arch:x86
a52008fa72fddb95bc0abb2b8ceba425
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeleteCriticalSection
HeapFree
GetProcessHeap
InterlockedIncrement
InterlockedDecrement
GlobalUnlock
GlobalLock
GlobalAlloc
lstrlenW
MulDiv
HeapAlloc
FlushInstructionCache
GetCurrentProcess
lstrcmpA
WideCharToMultiByte
GetModuleFileNameA
GetModuleHandleA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetCurrentThreadId
ExitProcess
ReadFile
GetFileSize
GetSystemTime
MoveFileA
GetTempFileNameA
SetPriorityClass
OpenProcess
GetCurrentProcessId
SetThreadPriority
GetCurrentThread
CreateProcessA
CopyFileA
ReleaseMutex
CreateMutexA
WriteProcessMemory
ReadProcessMemory
SetWaitableTimer
CreateWaitableTimerA
GetTickCount
OutputDebugStringA
GetLocalTime
SetFilePointer
ResetEvent
SetEvent
TerminateThread
InitializeCriticalSection
LockResource
FindResourceExA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
IsBadCodePtr
IsBadReadPtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
TerminateProcess
IsBadWritePtr
VirtualFree
HeapCreate
SetUnhandledExceptionFilter
QueryPerformanceCounter
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCommandLineA
GetStartupInfoA
ExitThread
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
LocalFree
HeapSize
HeapReAlloc
HeapDestroy
LeaveCriticalSection
EnterCriticalSection
RaiseException
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CreateThread
WaitForSingleObject
MoveFileExA
GetTempPathA
DeleteFileA
LoadLibraryA
GetLastError
WriteFile
CreateFileA
GetSystemDirectoryA
GetProcAddress
CloseHandle
GetFullPathNameA
CreateEventA
lstrcatA
Sleep
lstrlenA
user32
ReleaseCapture
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
DefWindowProcA
UnregisterClassA
GetWindowLongA
SetWindowLongA
PostMessageA
GetWindowRect
CharLowerBuffA
SetRect
IsWindowVisible
GetWindowThreadProcessId
EnumChildWindows
EnumWindows
MessageBoxA
GetSysColor
SetCapture
FillRect
GetClientRect
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
GetDesktopWindow
CallWindowProcA
EndPaint
BeginPaint
SetFocus
GetWindow
IsChild
GetFocus
DestroyAcceleratorTable
SendMessageA
IsWindow
GetDlgItem
RedrawWindow
DestroyWindow
SetWindowPos
GetClassNameA
GetParent
CharNextA
CreateAcceleratorTableA
CreateWindowExA
wsprintfA
SetThreadDesktop
CreateDesktopA
ClientToScreen
MsgWaitForMultipleObjects
IsWindowUnicode
GetMessageW
GetMessageA
TranslateMessage
DispatchMessageW
DispatchMessageA
PeekMessageA
FindWindowExA
gdi32
SelectObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetDeviceCaps
GetObjectA
GetStockObject
CreateSolidBrush
CreateDIBSection
SetPixel
GetPixel
DeleteObject
advapi32
CloseServiceHandle
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
CreateServiceA
OpenServiceA
OpenSCManagerA
ole32
CoCreateGuid
CoTaskMemRealloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemFree
oleaut32
SysAllocString
SysFreeString
SafeArrayRedim
VariantCopyInd
SafeArrayCreate
SafeArrayDestroy
VarBstrCmp
SafeArrayLock
SafeArrayUnlock
DispCallFunc
SysAllocStringByteLen
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysStringLen
SysAllocStringLen
shlwapi
PathFindExtensionA
PathFindExtensionW
gdiplus
GdipCloneImage
GdipAlloc
GdipFree
GdiplusShutdown
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipSaveImageToFile
GdipDisposeImage
GdiplusStartup
winmm
waveOutOpen
wininet
FindCloseUrlCache
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
ws2_32
send
recv
connect
WSAStartup
WSACleanup
htons
gethostbyname
socket
select
ioctlsocket
closesocket
Sections
.flat Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ