d:\Works\ByShell_Up19\WinStart\Release\WinStart.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c5d91d60aa3a6c3464d77b67d51559f0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c5d91d60aa3a6c3464d77b67d51559f0.exe
Resource
win10v2004-20240226-en
General
-
Target
c5d91d60aa3a6c3464d77b67d51559f0
-
Size
207KB
-
MD5
c5d91d60aa3a6c3464d77b67d51559f0
-
SHA1
c3a7e38169d4d6f49942a04654bf1a94544c9bc6
-
SHA256
569377631d7c95bd32ddf87a56366746e1090461660fea4d148a11da9f03a082
-
SHA512
0ca4ed4abef68e06ff5ea63a64baa5422dfb947f513be0cd1adfc5a4aa3ffca8876785ad99e84d3a91e45b01dabc6e6465a214c035021dd1934e5bf2d12c79de
-
SSDEEP
3072:b0/2pQGqVlRStBMYiuaTyI1lTL0FpKyKpbe2if5lAZxyHmHg:G2pvqxStcph1NLO0yQSmZMHmHg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c5d91d60aa3a6c3464d77b67d51559f0
Files
-
c5d91d60aa3a6c3464d77b67d51559f0.exe windows:4 windows x86 arch:x86
c88fa953023734f7156c298cb28cc4c2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LockResource
GlobalAlloc
LoadResource
SizeofResource
FindResourceW
GetSystemDirectoryA
ResumeThread
CreateProcessW
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatW
lstrcpyW
GetEnvironmentVariableW
GetShortPathNameW
GetModuleFileNameW
CreateFileA
FindResourceA
SetFilePointer
OutputDebugStringA
GetTimeFormatA
GetLocalTime
SetCurrentDirectoryA
DeleteFileA
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
Sleep
CopyFileA
GetModuleFileNameA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetSystemInfo
VirtualProtect
SetEndOfFile
GetCPInfo
GetOEMCP
GetStringTypeW
CreateFileW
WriteFile
GlobalFree
GetCurrentProcess
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetLocaleInfoA
GetACP
GetVersionExA
LoadLibraryA
GetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
GetTickCount
ExitProcess
RtlUnwind
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualQuery
ReadFile
TerminateProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetStdHandle
FlushFileBuffers
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
InterlockedExchange
user32
RegisterClassExW
CreateWindowExW
ShowWindow
UpdateWindow
DefWindowProcW
advapi32
RegRestoreKeyA
RegCreateKeyA
RegOpenKeyExA
RegSaveKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xiaohui Size: 34B - Virtual size: 34B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ