d:\ciba\project\Powerword2008\branches\GooglePatch\bin\release\sendstatistic.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c0405392a50779f62d46c63340dee722.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0405392a50779f62d46c63340dee722.exe
Resource
win10v2004-20240226-en
General
-
Target
c0405392a50779f62d46c63340dee722
-
Size
356KB
-
MD5
c0405392a50779f62d46c63340dee722
-
SHA1
dfd560d27174d4bb56c6dd5bbb96e8c779dc7972
-
SHA256
cb72de222bca0a9d87e72817357732c7b5cfb7b6f20d55cdde16776cca065428
-
SHA512
a20cc373601e353c7accd5f46b964b242d79c1e8c3e1f410828572f9eb15b629af256f73b04328f1730f9381fdcf313d41aea32bb559af16ef78619ed727c008
-
SSDEEP
6144:5RbJl5x45tIZ8gmZs9rrALXqo1jmUZxL6xQGQXK3M:VOwdmZs9ELXqs76GK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0405392a50779f62d46c63340dee722
Files
-
c0405392a50779f62d46c63340dee722.exe windows:4 windows x86 arch:x86
1d8863b1d8b43d64fcb4e39e90efb7e3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryW
GetProcAddress
InterlockedDecrement
FreeLibrary
GetModuleFileNameW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
CreateFileW
CreateFileA
GetLocaleInfoW
GetTimeZoneInformation
GetLastError
MultiByteToWideChar
WideCharToMultiByte
HeapFree
GetProcessHeap
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
CreateDirectoryW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetCommandLineA
GetVersionExA
HeapAlloc
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
LCMapStringW
GetCPInfo
GetModuleHandleA
ExitProcess
SetFilePointer
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
GetFileType
ReadFile
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
GetFullPathNameA
GetCurrentDirectoryA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
LoadLibraryA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
advapi32
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegOpenKeyW
shell32
SHGetFolderPathW
oleaut32
SysFreeString
SysAllocString
SysAllocStringLen
VariantClear
shlwapi
PathRemoveFileSpecW
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE