D:\actions-runner\_work\Titanium\Titanium\src\build\symbol\Release\Win32\7zsfx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8462152e50ac014a543d7673e3a775b264c01350c58ca87ec8b1acf9708d1366.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8462152e50ac014a543d7673e3a775b264c01350c58ca87ec8b1acf9708d1366.exe
Resource
win10v2004-20240226-en
General
-
Target
8462152e50ac014a543d7673e3a775b264c01350c58ca87ec8b1acf9708d1366
-
Size
10.0MB
-
MD5
bcc5015411f78ffd7e1d22417aee653b
-
SHA1
d0d57fd98b51199aa0462f09e04f5372d36f1df6
-
SHA256
8462152e50ac014a543d7673e3a775b264c01350c58ca87ec8b1acf9708d1366
-
SHA512
978fb5a5bac2bb6e2dcda5f205388838b431f3b91850af7d9c72958616d29a8b287b20b2ec7d3db2689fd52baebf7b82c387228035ed3f5522b175a17cb10989
-
SSDEEP
196608:WN4iFKfbwhyejyzaSmILdyMWQmG1i5VACf9n03DMAFPCQzFrpg60:WNTFGchyeF/E1WLAcnBYPCQzFd0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8462152e50ac014a543d7673e3a775b264c01350c58ca87ec8b1acf9708d1366
Files
-
8462152e50ac014a543d7673e3a775b264c01350c58ca87ec8b1acf9708d1366.exe windows:6 windows x86 arch:x86
67b0d5f1b38ce9e5b5ba8698a9492bb4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
setsockopt
connect
closesocket
send
recv
WSASetLastError
getservbyname
socket
gethostbyaddr
inet_ntoa
htons
htonl
WSAGetLastError
WSACleanup
gethostbyname
select
ntohs
getsockopt
ioctlsocket
shutdown
getservbyport
getaddrinfo
WSAStartup
inet_addr
gethostname
getnameinfo
freeaddrinfo
kernel32
HeapQueryInformation
GetCommandLineW
GetCommandLineA
SetConsoleCtrlHandler
PeekNamedPipe
FreeLibraryAndExitThread
ExitThread
CreateThread
GetModuleHandleExW
ExitProcess
RtlUnwind
OpenEventA
lstrlenA
GetLastError
LoadLibraryA
GetProcAddress
GetTempPathA
GetTempFileNameA
DeleteFileA
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
SizeofResource
LockResource
LoadResource
FindResourceW
GetModuleFileNameW
GetModuleHandleW
OutputDebugStringW
ExpandEnvironmentStringsW
LocalFree
CloseHandle
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalAlloc
CreateFileW
LoadLibraryW
FreeLibrary
GetWindowsDirectoryW
SetCurrentDirectoryW
WaitForSingleObject
GetCurrentProcessId
GlobalUnlock
RemoveDirectoryW
GetUserDefaultUILanguage
MulDiv
InitializeCriticalSection
GlobalLock
GetStdHandle
GetTempPathW
WriteFile
SleepEx
GetFileAttributesW
CreateDirectoryW
DeleteFileW
GetSystemTime
GetTimeZoneInformation
lstrcpyW
GetDiskFreeSpaceExW
SetFileAttributesW
GetLogicalDriveStringsW
lstrlenW
HeapFree
InitializeCriticalSectionEx
HeapSize
HeapReAlloc
RaiseException
HeapAlloc
DecodePointer
GetProcessHeap
FindFirstFileW
MoveFileExW
FindNextFileW
FindClose
IsProcessorFeaturePresent
GetSystemDirectoryW
SetFileTime
MoveFileW
GetFullPathNameW
GetCurrentDirectoryW
GetTempFileNameW
LoadLibraryExW
GetFileSize
SetFilePointer
GetFileInformationByHandle
ReadFile
SetEndOfFile
FileTimeToSystemTime
GetVersionExW
VirtualFree
VirtualAlloc
GetSystemInfo
ReleaseSemaphore
CreateEventW
SetEvent
ResetEvent
LCMapStringW
WaitForMultipleObjects
GetSystemDefaultLCID
GetSystemTimeAsFileTime
GetUserDefaultLCID
GetLocalTime
FlushFileBuffers
CopyFileW
GetCurrentProcess
CreateProcessW
ResumeThread
GetExitCodeProcess
CreateMutexW
ReleaseMutex
PulseEvent
TerminateProcess
GetDriveTypeW
AttachConsole
GetConsoleScreenBufferInfo
SetConsoleScreenBufferSize
FreeConsole
GetSystemDefaultUILanguage
IsValidLocale
GetUserGeoID
LoadLibraryExA
GetCurrentThreadId
SetThreadPriority
GetExitCodeThread
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
FormatMessageA
FormatMessageW
CreateEventA
DuplicateHandle
QueryPerformanceCounter
WaitForSingleObjectEx
SetLastError
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemDirectoryA
VirtualProtect
GetEnvironmentVariableW
GetFileType
GetACP
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
OutputDebugStringA
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GlobalAlloc
GetCurrentThread
GlobalDeleteAtom
lstrcmpA
lstrcmpW
CompareStringA
EncodePointer
GlobalAddAtomW
GlobalFindAtomW
CompareStringW
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetLocaleInfoW
GlobalFlags
GetVolumeInformationW
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesExW
GetFileSizeEx
SystemTimeToTzSpecificLocalTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
EnumSystemLocalesW
GetConsoleOutputCP
SetStdHandle
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
VirtualQuery
CreateSemaphoreW
GetGeoInfoW
GetStringTypeW
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
FindFirstFileExW
SetFilePointerEx
LCMapStringEx
CompareStringEx
GetCPInfo
comctl32
InitCommonControlsEx
_TrackMouseEvent
Exports
Exports
CheckConnection
GetIEProxySetting
SentHttp
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 660KB - Virtual size: 659KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 579KB - Virtual size: 579KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ