ielowutil.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b4cd055e8490c70bb35b1168b595fe86.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4cd055e8490c70bb35b1168b595fe86.exe
Resource
win10v2004-20240226-en
General
-
Target
b4cd055e8490c70bb35b1168b595fe86
-
Size
244KB
-
MD5
b4cd055e8490c70bb35b1168b595fe86
-
SHA1
db5e9d33007612540ec281ec1667bfd7e55ce9de
-
SHA256
f1127ee43cd4c5b5cc902a4e5ece8da4099bd9dca6f4ab1b30c699d0ecf64b90
-
SHA512
8f7e7bd44529a7105334adf562f0a60d73aa0d054b638330ba4cc26bd30fd66082d658300e6caba446a980b40779595e1574ded18c4085192d17da7648d512aa
-
SSDEEP
3072:P9stD7trOt9pfslMYO9mXn9H0LeinObM6gZy5ChoTi1DQ7XSXzmZUJ:Vw1rOt9pdYamXnrdbMKwNiXSXzi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4cd055e8490c70bb35b1168b595fe86
Files
-
b4cd055e8490c70bb35b1168b595fe86.exe windows:6 windows x64 arch:x64
c2144641dff280581230ba03b4015502
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
HeapSetInformation
CreateEventW
GetProcAddress
GetModuleHandleW
CreateThread
VirtualAlloc
IsWow64Process
GetVersionExA
OpenEventW
OpenFileMappingW
GetCurrentProcess
MapViewOfFile
LoadLibraryExW
GetModuleFileNameW
DeactivateActCtx
ActivateActCtx
ReleaseActCtx
CreateActCtxW
FreeLibrary
CloseHandle
ResetEvent
SetLastError
GetLastError
GetProcessHeap
SetEvent
WaitForSingleObject
HeapFree
HeapAlloc
UnmapViewOfFile
Sleep
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
TerminateProcess
user32
MsgWaitForMultipleObjects
PostQuitMessage
TranslateMessage
DispatchMessageW
PeekMessageW
msvcrt
__wgetmainargs
__set_app_type
exit
_exit
_cexit
__setusermatherr
_initterm
__C_specific_handler
_amsg_exit
_fmode
_commode
?terminate@@YAXXZ
_XcptFilter
memset
wcstok
_wtoi
_wcmdln
_wcsnicmp
rand_s
_vsnwprintf
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
ole32
CoInitializeEx
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CoUninitialize
CLSIDFromString
CoInitializeSecurity
wininet
InternetGetCookieExW
InternetSetCookieExW
iertutil
ord466
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 203KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE