m:\uvatuehr\soopjsvs\dce.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c04449ef6ddfb902e9f1a145de79f8b4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c04449ef6ddfb902e9f1a145de79f8b4.exe
Resource
win10v2004-20240226-en
General
-
Target
c04449ef6ddfb902e9f1a145de79f8b4
-
Size
2.5MB
-
MD5
c04449ef6ddfb902e9f1a145de79f8b4
-
SHA1
2f88689efef4956712ffe6c15bab7aaa32b04814
-
SHA256
ede75b3e1bef9235b98b066c5f6e4467f4c0a57ddfdbe8d6489cc12b8ac66ebd
-
SHA512
dda9b7c86ad08f10dc03f2c350bfd80e90806f11e6de040ce2b773796acb8e4dc1cba0e679d14acbad32fb4edfdacd71a385cb2d647b4574aa8ce5718c366aa2
-
SSDEEP
49152:fw//0SEl12gt53wsbpXltgb9ccnJVyHfnZt1ucK3o9AJLWUXE:Y//BE3p531t3gb9cgIHDK3sWX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c04449ef6ddfb902e9f1a145de79f8b4
Files
-
c04449ef6ddfb902e9f1a145de79f8b4.exe windows:4 windows x86 arch:x86
f2f48db13ea445e5ea42d63e3753aaa7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
MakeDragList
ImageList_DrawEx
ImageList_Remove
CreateStatusWindow
user32
PostThreadMessageA
ActivateKeyboardLayout
SetPropA
GetDlgCtrlID
LoadMenuIndirectW
EnumThreadWindows
RegisterClassExA
ChangeDisplaySettingsExA
CreateWindowExA
DefWindowProcA
DestroyWindow
CharLowerBuffA
MessageBoxExW
RegisterClassA
IsWindowEnabled
DdeInitializeW
GetClipboardSequenceNumber
ShowWindow
DialogBoxIndirectParamA
DrawAnimatedRects
GetDlgItemTextW
MessageBoxW
kernel32
LCMapStringW
ReadFile
GetEnvironmentStrings
WideCharToMultiByte
SetUnhandledExceptionFilter
InterlockedIncrement
VirtualAlloc
GetSystemTimeAsFileTime
SetLocaleInfoA
SetFilePointer
CreateFileA
SetEnvironmentVariableA
CompareStringW
WriteConsoleOutputW
GetModuleHandleA
TlsGetValue
WriteFile
GetStringTypeW
GetCurrentThreadId
FindFirstFileExW
DeleteCriticalSection
GetConsoleCP
GetThreadPriorityBoost
QueryPerformanceCounter
GetDateFormatA
ResetEvent
InterlockedDecrement
IsValidCodePage
IsDebuggerPresent
GetModuleFileNameW
IsValidLocale
GetCurrentProcess
SetHandleCount
CompareStringA
GetThreadTimes
ExitProcess
RtlUnwind
WriteConsoleA
HeapCreate
GetStdHandle
GetConsoleOutputCP
InterlockedExchange
FreeEnvironmentStringsW
GetOEMCP
GetCurrentProcessId
TlsAlloc
SetConsoleWindowInfo
GetLocaleInfoW
EnterCriticalSection
UnhandledExceptionFilter
GetTimeZoneInformation
GetProcessHeap
LCMapStringA
SetThreadAffinityMask
SetLastError
GetCommandLineW
SetStdHandle
HeapAlloc
LeaveCriticalSection
LoadLibraryA
GetLastError
CreateMutexA
GetStartupInfoA
CloseHandle
GetProcAddress
OutputDebugStringA
VirtualFree
GetTickCount
GetPrivateProfileIntA
WriteConsoleW
InitializeCriticalSection
GetFileType
TlsSetValue
EnumSystemLocalesA
GetACP
GetTimeFormatA
FreeLibrary
GetEnvironmentStringsW
GetModuleFileNameA
GetCPInfo
GetLocaleInfoA
GetStringTypeA
EnumCalendarInfoExW
GetStartupInfoW
VirtualQuery
GlobalSize
FreeEnvironmentStringsA
FlushFileBuffers
GetConsoleMode
GlobalGetAtomNameA
HeapFree
SetConsoleCtrlHandler
HeapSize
GetUserDefaultLCID
GetCurrentThread
MultiByteToWideChar
OpenMutexA
HeapReAlloc
GetVersionExA
GetCommandLineA
TerminateProcess
HeapDestroy
GetFullPathNameA
TlsFree
GetFileSize
Sleep
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 316KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ