D:\RDM\projects\48078\chrome\src\out\Release_x86\BugReport.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e8e940520e6bb8ebf2d9bd0d0661af67.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8e940520e6bb8ebf2d9bd0d0661af67.exe
Resource
win10v2004-20240226-en
General
-
Target
e8e940520e6bb8ebf2d9bd0d0661af67
-
Size
936KB
-
MD5
e8e940520e6bb8ebf2d9bd0d0661af67
-
SHA1
3fc43df6ed919b19e6104ae18c1cdb18f0501554
-
SHA256
71a8d8ae87c68af5130b29317fbc81c931797d24e59e059be17a667204a849a9
-
SHA512
e70812fe82ee3d44ec1dbde018f54b63507986c64efaca60e0cef392f852d183a84d70b4460db81d9492b8b09cff11b7942230e1e8f8b43a35c9df6f8c0ca639
-
SSDEEP
12288:judQ2InrfRplW+cKAwJU0orxwtsrlZLnslCMTRRfqz:j6n2rpWPwJU0mZLnvMTrSz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e8e940520e6bb8ebf2d9bd0d0661af67
Files
-
e8e940520e6bb8ebf2d9bd0d0661af67.exe windows:5 windows x86 arch:x86
40990786341333ca8ca1d3452b2ea35c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
ord17
wininet
InternetCloseHandle
HttpSendRequestW
HttpQueryInfoW
HttpSendRequestA
HttpOpenRequestW
InternetOpenA
InternetConnectW
InternetReadFile
InternetSetOptionW
dbghelp
SymGetModuleInfo
SymFunctionTableAccess
SymCleanup
SymSetOptions
StackWalk
SymInitialize
SymLoadModule
SymGetModuleInfoW
gdi32
SetTextColor
SetBkColor
DeleteObject
CreateSolidBrush
CreateFontW
kernel32
GetDriveTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadConsoleW
GetStdHandle
ExitProcess
GetConsoleMode
GetConsoleCP
GetFileType
SetStdHandle
GetCommandLineA
WriteConsoleW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetACP
CreateDirectoryW
CreateFileW
GetFileSize
ReadFile
SetFilePointer
GetTempPathW
DecodePointer
CloseHandle
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetTickCount
GetVersionExW
GetModuleHandleW
GetProcAddress
CreateFileA
DeleteFileW
FileTimeToLocalFileTime
FindClose
FindFirstFileW
FindNextFileW
WriteFile
GetProcessTimes
OpenThread
GetProcessId
GetProcessHandleCount
GlobalMemoryStatusEx
GetSystemTimeAsFileTime
GetLocalTime
VirtualQueryEx
ReadProcessMemory
GetModuleFileNameW
LocalAlloc
LocalFree
lstrcpynW
FileTimeToSystemTime
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Module32FirstW
Module32NextW
SetCurrentDirectoryW
HeapAlloc
HeapFree
GetProcessHeap
SetEvent
WaitForSingleObject
CreateProcessW
OpenProcess
VirtualProtect
SetDllDirectoryW
GetFileAttributesW
GetCurrentProcessId
GetCurrentThreadId
SetLastError
CreatePipe
Sleep
GetCurrentProcess
CreateThread
LoadLibraryW
MoveFileW
WideCharToMultiByte
GetFileInformationByHandle
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
InitOnceExecuteOnce
HeapDestroy
HeapReAlloc
HeapSize
FreeLibrary
ExpandEnvironmentStringsW
DeviceIoControl
GetSystemDirectoryW
GetPrivateProfileStringW
MultiByteToWideChar
GetFullPathNameW
RemoveDirectoryW
lstrcmpiW
GetSystemInfo
HeapCreate
GetModuleHandleA
CreateEventW
GetNativeSystemInfo
GetCurrentDirectoryW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetWindowsDirectoryW
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
QueryPerformanceFrequency
QueryPerformanceCounter
FindFirstFileExW
IsDebuggerPresent
GetCommandLineW
SetEnvironmentVariableW
GetEnvironmentVariableW
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
TerminateProcess
GetModuleHandleExW
VirtualQuery
ResetEvent
LoadLibraryExA
LoadLibraryExW
RtlUnwind
InitializeSListHead
GetStartupInfoW
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
OutputDebugStringW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
LeaveCriticalSection
EnterCriticalSection
oleaut32
VariantInit
VariantClear
SysAllocString
psapi
GetProcessMemoryInfo
GetModuleFileNameExA
shell32
SHGetKnownFolderPath
SHGetSpecialFolderPathW
SHGetFolderPathW
shlwapi
PathFileExistsW
PathIsDirectoryW
PathRemoveBlanksW
PathRemoveBackslashW
PathRemoveFileSpecW
PathCombineW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ws2_32
htons
ntohl
ntohs
htonl
rpcrt4
RpcStringFreeW
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcBindingFree
NdrClientCall2
netapi32
NetApiBufferFree
Netbios
NetWkstaTransportEnum
Exports
Exports
GetHandleVerifier
Sections
.text Size: 369KB - Virtual size: 369KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 427KB - Virtual size: 427KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ