t:\dw\x86\ship\0\dw20.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b8823c5d4f1080c57367457f5501c5ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8823c5d4f1080c57367457f5501c5ad.exe
Resource
win10v2004-20240226-en
General
-
Target
b8823c5d4f1080c57367457f5501c5ad
-
Size
818KB
-
MD5
b8823c5d4f1080c57367457f5501c5ad
-
SHA1
520c4bfbc3139a11192b9ad1e80a6086c56c08fa
-
SHA256
50dc91617b46f9f2889f5d41e02e95a7dd8a805d9e88e9343242f42b0123801b
-
SHA512
05ccccb5501035266078de9ffd506e9f64a5c6eb249d5811e001981517435063353c2bfff94b1ec7c179b0308a3e1dac66ace96604541ef946508fece764b306
-
SSDEEP
12288:p1q1lx7S5EE0XB5t5m/YKREwm8QChv3ikO2LxkEgm+:p1q1lx7SqE0xJ2pm8FiWCm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8823c5d4f1080c57367457f5501c5ad
Files
-
b8823c5d4f1080c57367457f5501c5ad.exe windows:5 windows x86 arch:x86
015a47aa3b91ab4911e68e6c84841d66
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerQueryValueA
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
secur32
GetUserNameExW
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenThreadToken
UnregisterTraceGuids
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorA
ConvertSidToStringSidA
SetNamedSecurityInfoW
GetSecurityDescriptorDacl
RegSetValueExW
RegDeleteValueW
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegQueryInfoKeyA
GetUserNameA
DeregisterEventSource
ReportEventA
RegisterEventSourceW
ReportEventW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsA
TraceEvent
RegQueryInfoKeyW
RegEnumKeyW
RegEnumValueW
GetLengthSid
AddAccessAllowedAce
AddAccessDeniedAce
InitializeAcl
AllocateAndInitializeSid
CopySid
GetTokenInformation
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CheckTokenMembership
IsValidSid
comctl32
ImageList_Create
ImageList_ReplaceIcon
ord17
ImageList_Destroy
gdi32
TranslateCharsetInfo
CreateSolidBrush
CreateDCA
GetTextMetricsA
DeleteDC
RestoreDC
DeleteObject
GetTextFaceA
SelectObject
CreateFontA
GetDeviceCaps
SetMapMode
SaveDC
CreateFontIndirectW
GetObjectW
GetTextExtentPoint32W
SetTextAlign
CreateFontIndirectA
GetObjectA
ExtTextOutW
SetBkMode
SetTextColor
kernel32
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
lstrcmpiW
SetStdHandle
LeaveCriticalSection
EnterCriticalSection
GetLastError
GetLocalTime
GetCommandLineW
ReleaseMutex
WaitForSingleObject
WaitForMultipleObjects
Sleep
GetCurrentProcess
TerminateProcess
SetProcessWorkingSetSize
DeleteFileW
CreateThread
CloseHandle
GetCurrentProcessId
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleA
MapViewOfFile
GetVersionExW
GetVersionExA
GetModuleFileNameW
FreeLibrary
InitializeCriticalSection
GetProcessHeap
DeleteCriticalSection
MultiByteToWideChar
GetSystemTimeAsFileTime
GetTickCount
SetLastError
LocalFree
WriteFile
GetTimeFormatW
GetDateFormatW
FindNextFileW
FindClose
FindFirstFileW
GetSystemWindowsDirectoryW
MoveFileW
SetFilePointer
RaiseException
GetComputerNameA
SetPriorityClass
UnmapViewOfFile
GetFileSize
CreateFileMappingA
SuspendThread
ExitThread
MulDiv
GetModuleFileNameA
LoadLibraryA
GetSystemDefaultLangID
GetSystemDefaultUILanguage
GetUserDefaultLangID
GetACP
GetSystemDefaultLCID
SetEvent
GetTempPathW
GetFileAttributesW
ExpandEnvironmentStringsW
WideCharToMultiByte
CreateProcessW
SetThreadPriority
CreateRemoteThread
OpenProcess
LoadLibraryExA
SetEndOfFile
IsDBCSLeadByte
GetSystemDirectoryA
SetEnvironmentVariableA
CreateDirectoryW
ReadProcessMemory
VirtualQueryEx
GetSystemInfo
HeapFree
HeapAlloc
VirtualAlloc
HeapSetInformation
HeapCreate
HeapDestroy
HeapReAlloc
HeapSize
HeapUnlock
HeapLock
TlsSetValue
GetModuleHandleW
GetModuleHandleExW
RtlCaptureStackBackTrace
SetFileAttributesW
VirtualFree
TlsGetValue
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsFree
GetVersion
CreateFileW
GetLocaleInfoW
GetProcessTimes
CreateEventA
OpenEventA
GlobalFree
LoadLibraryW
OutputDebugStringA
CreateMutexA
OpenMutexA
CreateSemaphoreA
OpenSemaphoreA
GetShortPathNameA
GlobalAlloc
LocalAlloc
GetCurrentThreadId
IsValidLocale
GetSystemDirectoryW
GetTimeZoneInformation
GetDiskFreeSpaceExW
IsWow64Process
GetUserDefaultLCID
GetConsoleMode
GetStringTypeExW
IsValidCodePage
CompareStringW
GetShortPathNameW
GetLongPathNameW
GetFileType
CreateFileA
LoadLibraryExW
GetCurrentThread
FlushFileBuffers
GlobalMemoryStatus
ReleaseSemaphore
IsProcessorFeaturePresent
EnumUILanguagesW
EnumSystemLocalesW
GetCalendarInfoW
GetUserDefaultUILanguage
GetCommandLineA
GetStartupInfoA
RtlUnwind
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InterlockedIncrement
InterlockedDecrement
QueryPerformanceCounter
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetOEMCP
LCMapStringA
LCMapStringW
InterlockedExchange
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
ole32
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoCreateInstance
StringFromIID
oleacc
LresultFromObject
CreateStdAccessibleObject
oleaut32
VariantTimeToDosDateTime
SystemTimeToVariantTime
SysAllocString
SysFreeString
SysStringLen
rpcrt4
UuidCreate
shell32
SHGetSpecialFolderPathW
ShellExecuteExA
ExtractIconExA
shlwapi
AssocQueryStringW
UrlGetPartA
wnsprintfA
urlmon
CreateURLMoniker
user32
SetRectEmpty
IsWindowVisible
CreateDialogIndirectParamA
DrawTextA
DrawTextW
MapDialogRect
CallWindowProcA
CallWindowProcW
GetMenuCheckMarkDimensions
IsWindow
GetKeyboardLayout
LoadBitmapA
GetMonitorInfoA
GetWindowLongW
GetKeyboardLayoutList
GetDlgCtrlID
MoveWindow
RegisterClassExA
PostMessageA
SendMessageA
DefWindowProcA
SetTimer
KillTimer
PostQuitMessage
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
CreateWindowExA
DialogBoxParamA
SystemParametersInfoA
DestroyIcon
LoadStringW
DestroyWindow
ReleaseDC
FillRect
GetSysColorBrush
MapWindowPoints
GetWindowRect
GetDC
SetWindowTextA
CreateDialogParamW
DialogBoxParamW
EnumDisplayMonitors
GetSystemMetrics
GetDlgItem
DrawIconEx
SetWindowPos
LoadIconA
ShowWindow
GetWindowLongA
SetWindowLongA
SetForegroundWindow
GetClientRect
SetCursor
LoadCursorA
InvalidateRect
DrawFocusRect
SetWindowTextW
GetWindow
EnableWindow
GetSysColor
SendDlgItemMessageA
EndDialog
CheckDlgButton
SetFocus
LoadStringA
IsDlgButtonChecked
SetDlgItemTextA
GetScrollInfo
SetScrollInfo
GetFocus
FlashWindowEx
GetForegroundWindow
GetWindowPlacement
IsIconic
GetWindowThreadProcessId
EnumWindows
SendMessageTimeoutA
GetParent
UpdateWindow
IsWindowUnicode
GetClassNameA
SendMessageW
wininet
InternetCrackUrlA
InternetCanonicalizeUrlA
HttpOpenRequestA
InternetCloseHandle
InternetReadFileExA
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
InternetConnectA
InternetOpenA
InternetSetStatusCallback
InternetGetConnectedState
HttpQueryInfoA
Exports
Exports
_GetAllocCounters@0
Sections
.text Size: 572KB - Virtual size: 571KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 203KB - Virtual size: 323KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ