c:\iKEj7qDm4cYxb\jeWq9A.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b518cf1b3ddbf646dc590e0d005776fc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b518cf1b3ddbf646dc590e0d005776fc.exe
Resource
win10v2004-20240226-en
General
-
Target
b518cf1b3ddbf646dc590e0d005776fc
-
Size
218KB
-
MD5
b518cf1b3ddbf646dc590e0d005776fc
-
SHA1
5177b0cabc249a2bda63509fddeb421e19357bca
-
SHA256
18d48eedaef81585f20207cf316cd49502a551181d21e9515384cd20c2084f91
-
SHA512
9fc753c101f80b8c50245ad6a02d2cf7df9327a9a7963da4bb89c03eefd4cc9b6d33d364b3f59b452a57ba596c6458c89e0ab9cf051c3ec725e50d760a2f0454
-
SSDEEP
6144:28wasRS68nsA/zk2y9GNbICHfNbp4z5F65/pKRLr+B7qHVYp:vtsRTuR/zk2cK7/NlSM2LieHq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b518cf1b3ddbf646dc590e0d005776fc
Files
-
b518cf1b3ddbf646dc590e0d005776fc.exe windows:5 windows x86 arch:x86
847357df447681a1d8c3a7448bbd39ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
GetModuleHandleA
GetLastError
FlushFileBuffers
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetModuleHandleW
Sleep
InterlockedIncrement
InterlockedDecrement
GetProcAddress
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
SetFilePointer
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
InitializeCriticalSectionAndSpinCount
RtlUnwind
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
RaiseException
CreateFileA
CloseHandle
user32
wvsprintfA
wsprintfA
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ