e:\ssnn.PDB
Static task
static1
Behavioral task
behavioral1
Sample
c29b61dae01a0c9d4392bb77a81afd58.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c29b61dae01a0c9d4392bb77a81afd58.exe
Resource
win10v2004-20240226-en
General
-
Target
c29b61dae01a0c9d4392bb77a81afd58
-
Size
443KB
-
MD5
c29b61dae01a0c9d4392bb77a81afd58
-
SHA1
9c69cd8e3f5d8a3f95a441badd18b0ee76ee9c5e
-
SHA256
1ab9bfc0fa07edced37d832a5af89521ef9071bf2a9ad1e8013cd32ce9d7fc89
-
SHA512
d43eedbafd36a1925ad2bb442e7707c63e4d54700f8f980e6da2d05fb5e12a73fa678c4580c6ca46d6403fcd7941a25dc3ad2ca031f3edca2d7549b9c184a076
-
SSDEEP
6144:uWvfcBFFeW7z12SO/L7Po+jFtxBFSQ/JVGfVFyNyAzgXPzNjFD/E8sGRXXnnS:zuFeW7z12XRtFSUV+VFycZFDM8lX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c29b61dae01a0c9d4392bb77a81afd58
Files
-
c29b61dae01a0c9d4392bb77a81afd58.exe windows:4 windows x86 arch:x86
10b27ee626d8330133295a90aac02b1a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
CallNextHookEx
RegisterClassA
ShowWindowAsync
ClientToScreen
RegisterClassExA
comctl32
InitCommonControlsEx
comdlg32
FindTextW
GetFileTitleA
ChooseColorA
GetOpenFileNameW
shell32
SHGetDataFromIDListA
kernel32
OpenMutexA
GetStartupInfoA
EnterCriticalSection
WriteFile
LocalFree
GetTimeFormatA
GetStdHandle
CompareStringA
GetSystemTimeAsFileTime
HeapAlloc
WriteProfileSectionA
ExitProcess
DeleteCriticalSection
CreateMutexA
GetCommandLineW
GetCurrentThread
FlushFileBuffers
TlsGetValue
HeapCreate
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
GetExitCodeProcess
GetModuleFileNameW
WriteConsoleA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
WaitNamedPipeA
GetConsoleOutputCP
LocalReAlloc
GetDiskFreeSpaceW
SetFilePointer
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcess
GetLocaleInfoW
CreateSemaphoreW
GetCurrentProcessId
SetUnhandledExceptionFilter
CompareStringW
GetStringTypeA
TerminateProcess
WideCharToMultiByte
GetProcessHeap
IsValidLocale
GetTimeZoneInformation
SetHandleCount
GetOEMCP
InitializeCriticalSectionAndSpinCount
EnumSystemLocalesA
VirtualQuery
HeapSize
GetCPInfo
TlsSetValue
RemoveDirectoryW
LoadLibraryA
LCMapStringW
GetStringTypeW
SetLastError
EnumResourceLanguagesA
OpenProcess
FreeLibrary
GetACP
MultiByteToWideChar
GetFullPathNameA
Sleep
VirtualAlloc
InterlockedExchange
VirtualFree
GetProcessShutdownParameters
SetConsoleActiveScreenBuffer
GetProcAddress
GetFileType
HeapReAlloc
HeapFree
lstrcmpiA
GlobalAddAtomA
FlushViewOfFile
RtlUnwind
IsValidCodePage
GetModuleHandleA
GetTickCount
GetModuleHandleW
ReadFile
GetLastError
LeaveCriticalSection
CloseHandle
GetSystemTimeAdjustment
GetPrivateProfileIntA
TlsAlloc
GetStartupInfoW
HeapDestroy
GetDateFormatA
LCMapStringA
GetThreadContext
lstrcatW
GetModuleFileNameA
InterlockedIncrement
SetStdHandle
CreateFileA
InterlockedDecrement
IsDebuggerPresent
GetConsoleCP
SetEnvironmentVariableA
QueryPerformanceCounter
WriteConsoleW
SetConsoleCtrlHandler
GetConsoleMode
gdi32
ScaleViewportExtEx
GetCharABCWidthsA
CreateEnhMetaFileA
EnumObjects
PolyTextOutW
GetICMProfileA
EndPath
GetTextExtentPoint32A
GetKerningPairs
GetEnhMetaFileW
GetObjectType
OffsetRgn
SelectPalette
CreatePolygonRgn
GetLogColorSpaceW
GetTextColor
SetLayout
CopyEnhMetaFileA
Sections
.text Size: 299KB - Virtual size: 298KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ