C:\Surfright\Products\Alert\branch-8xx\bin\Release\hmpalert.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a7f3d321d217f457903404088bc9078f39909d97835ded9f4fb96e7efbf92572.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a7f3d321d217f457903404088bc9078f39909d97835ded9f4fb96e7efbf92572.exe
Resource
win10v2004-20240226-en
General
-
Target
a7f3d321d217f457903404088bc9078f39909d97835ded9f4fb96e7efbf92572
-
Size
4.9MB
-
MD5
81e8e69e6a1b6152ef4641fe9ce101bf
-
SHA1
206789b6ec5754662d80d90c2a45751027e1804f
-
SHA256
a7f3d321d217f457903404088bc9078f39909d97835ded9f4fb96e7efbf92572
-
SHA512
7fd19caabac40f9c1997328c733b9a280d5279d401461fea5ceada63fd7c14c14209b1dac9d4fd4317a4bf796c37d1af6d89a38f3bb41f90710bb364358992d1
-
SSDEEP
98304:uMZ0pKltTKH/0OY7cKRFOEFqpVoyvnhe6EJ:uMZ37HcKRHyvnhehJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a7f3d321d217f457903404088bc9078f39909d97835ded9f4fb96e7efbf92572
Files
-
a7f3d321d217f457903404088bc9078f39909d97835ded9f4fb96e7efbf92572.exe windows:5 windows x86 arch:x86
898daa690fc97a9134563e9989344897
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
InterlockedIncrement
QueueUserWorkItem
GetSystemTimeAsFileTime
CreateDirectoryW
DeleteCriticalSection
CompareFileTime
InitializeCriticalSection
EnterCriticalSection
GetWindowsDirectoryW
TryEnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
FindResourceW
SizeofResource
LoadResource
LockResource
FreeResource
GetLastError
Sleep
GetCurrentProcess
GetModuleHandleA
GetProcAddress
WTSGetActiveConsoleSessionId
LocalAlloc
GetDriveTypeW
GetVolumeInformationW
CreateEventW
WaitForSingleObject
CreateThread
SignalObjectAndWait
TerminateThread
FileTimeToSystemTime
GetDateFormatW
SetEvent
ResetEvent
SetThreadPriority
GetCurrentThread
InterlockedExchange
InterlockedCompareExchange
GetTickCount
OpenProcess
DuplicateHandle
GetModuleHandleExW
FileTimeToLocalFileTime
GetComputerNameW
GetCurrentProcessId
WaitForMultipleObjects
WaitForSingleObjectEx
GetOverlappedResult
CancelIo
GetLogicalDriveStringsW
QueryDosDeviceW
GetLongPathNameW
CreateWaitableTimerW
SetWaitableTimer
CreateFileA
GetFileSize
CreateTimerQueue
DeleteTimerQueueEx
CopyFileW
DeleteFileW
DeleteTimerQueueTimer
CreateTimerQueueTimer
ReadDirectoryChangesW
FreeLibrary
ReadFile
GetFileInformationByHandle
IsWow64Process
LoadLibraryW
ReadProcessMemory
QueryPerformanceFrequency
QueryPerformanceCounter
LoadLibraryA
ProcessIdToSessionId
WriteFile
DeviceIoControl
FindNextFileW
FindClose
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetWindowsDirectoryA
LoadLibraryExA
VirtualProtect
LoadLibraryExW
GetFileSizeEx
GetSystemTime
SetLastError
CreateHardLinkW
MoveFileExW
OpenEventW
GetCurrentThreadId
SetFilePointer
GetComputerNameA
GetLocalTime
GlobalAlloc
GlobalFree
GetModuleFileNameW
GlobalLock
GlobalUnlock
GetExitCodeProcess
TerminateProcess
GetTimeZoneInformation
GetVersionExW
CreateProcessW
CreateEventA
AreFileApisANSI
HeapCreate
HeapFree
GetFullPathNameW
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
GetFileAttributesW
UnmapViewOfFile
HeapValidate
HeapSize
MultiByteToWideChar
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
GetVersionExA
DeleteFileA
HeapReAlloc
GetSystemInfo
HeapAlloc
HeapCompact
HeapDestroy
UnlockFile
CreateFileMappingA
LockFileEx
GetProcessHeap
WideCharToMultiByte
FormatMessageA
CreateFileMappingW
MapViewOfFile
FlushFileBuffers
SetFileAttributesW
CreateIoCompletionPort
DisconnectNamedPipe
GetQueuedCompletionStatus
CreateNamedPipeW
ConnectNamedPipe
PeekNamedPipe
CreateFileW
GetSystemDirectoryW
LocalFree
FindFirstFileW
RaiseException
VirtualQuery
GetModuleHandleW
WaitNamedPipeW
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetConsoleCP
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetACP
ExitProcess
ExitThread
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
SetNamedPipeHandleState
GetLogicalProcessorInformation
GetThreadPriority
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
IsProcessorFeaturePresent
DecodePointer
EncodePointer
GetStringTypeW
TransactNamedPipe
CancelWaitableTimer
ResumeThread
InitializeCriticalSectionAndSpinCount
GetCalendarInfoA
MulDiv
ConvertDefaultLocale
VerifyVersionInfoW
VerSetConditionMask
GetSystemWow64DirectoryW
OpenMutexW
GetNativeSystemInfo
GetModuleHandleExA
Heap32First
Module32NextW
GlobalMemoryStatusEx
Module32FirstW
GetConsoleMode
Thread32First
Heap32ListNext
Thread32Next
VirtualAlloc
Heap32Next
Heap32ListFirst
GetStdHandle
VirtualFree
SystemTimeToFileTime
user32
IsWindowVisible
GetAsyncKeyState
GetUserObjectInformationW
TrackPopupMenu
ModifyMenuW
EnableMenuItem
SetMenuDefaultItem
AppendMenuW
CreatePopupMenu
RegisterWindowMessageA
ChangeDisplaySettingsW
EnumDisplaySettingsW
IsIconic
AllowSetForegroundWindow
AttachThreadInput
SetForegroundWindow
BringWindowToTop
IsWindowEnabled
CloseClipboard
SetClipboardData
EmptyClipboard
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
EnumDesktopWindows
ChildWindowFromPointEx
ScrollDC
CreateIconIndirect
LoadImageW
PostQuitMessage
GetMessageW
WindowFromPoint
SetWindowTextW
SetWindowLongW
EnableWindow
SetFocus
SetCursor
TrackMouseEvent
GetPropW
SetPropW
MoveWindow
SetParent
UpdateWindow
SetCursorPos
ClientToScreen
MapWindowPoints
GetClassNameW
EnumWindows
MapVirtualKeyExW
GetKeyboardLayout
GetWindowThreadProcessId
GetMonitorInfoW
MonitorFromWindow
GetWindowRect
GetCursorPos
GetWindow
GetWindowLongW
DestroyWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
SetWindowRgn
EqualRect
IsZoomed
ShowWindow
GetParent
CallNextHookEx
RealGetWindowClassA
IsRectEmpty
DefWindowProcW
SetLayeredWindowAttributes
EndPaint
BeginPaint
UnhookWinEvent
UnhookWindowsHookEx
MsgWaitForMultipleObjectsEx
DispatchMessageW
TranslateMessage
PeekMessageW
SetWindowsHookExW
SetWinEventHook
GetForegroundWindow
SystemParametersInfoW
GetSystemMetrics
GetClientRect
CallWindowProcW
GetWindowTextLengthW
SendMessageW
RegisterClassW
GetClassInfoW
GetIconInfo
DestroyIcon
ReleaseCapture
SetCapture
ScreenToClient
DrawFocusRect
InflateRect
InvalidateRect
PtInRect
SetRectEmpty
OffsetRect
CharUpperW
ReleaseDC
GetDC
MessageBoxExW
GetDesktopWindow
RedrawWindow
SetWindowPos
DrawIconEx
SetRect
GetMessageTime
GetInputState
GetCaretPos
GetMessagePos
FindWindowExW
CharUpperBuffW
CharLowerW
CharLowerBuffW
ExitWindowsEx
RegisterWindowMessageW
GetThreadDesktop
IsDialogMessageW
SwitchDesktop
OpenInputDesktop
GetUserObjectInformationA
CloseDesktop
PostMessageW
KillTimer
SetTimer
MessageBoxW
DrawTextW
CopyRect
FillRect
fltlib
FilterInstanceFindClose
FilterInstanceFindFirst
FilterGetDosName
FilterInstanceFindNext
mpr
WNetEnumResourceW
WNetCloseEnum
WNetOpenEnumW
netapi32
NetShareEnum
NetApiBufferFree
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 457KB - Virtual size: 456KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 1024B - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ