E:\build\nw19_win32\node-webkit\src\outst\nw\initialexe\nw.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
nw.exe
Resource
win10v2004-20240226-en
General
-
Target
nw.exe
-
Size
1016KB
-
MD5
227fd71910c4d20759c13e28fd4092a7
-
SHA1
2bdc54c3bb57a167f7cd4b9eca09b0bd230b0228
-
SHA256
ed4bf5da0e7c64473f1520977f3a0532efad8668e59d2be05aff2535a084cd02
-
SHA512
f4eb92f1309d2758ecdf1de15e42e8680b2f20463001b139aaf94dca0da768c0a61efca3056eeba03768078dd397e23c2d5c662bca2ce0df2f141fe3f5e40351
-
SSDEEP
12288:aFD895idfGVaSYET+GK1Ag77e0ak+6o3G3zdaW7yzvrs/sCL7kTgwNLIeX2I/zPB:u89YdaNcmvQjasNrmqyD55
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource nw.exe
Files
-
nw.exe.exe windows:5 windows x86 arch:x86
1a82b237e855538965391cf38b616580
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
nw_elf
SignalInitializeCrashReporting
SignalChromeElf
advapi32
ImpersonateNamedPipeClient
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
SystemFunction036
OpenProcessToken
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
GetTokenInformation
LookupPrivilegeValueW
CreateProcessAsUserW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
kernel32
GetProcAddress
GetLastError
SetLastError
CreateEventW
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetProcessId
SetCurrentDirectoryW
GetCurrentDirectoryW
SetProcessShutdownParameters
LoadLibraryExW
VirtualAlloc
VirtualFree
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
CreateFileW
DeleteFileW
WriteFile
OutputDebugStringA
CloseHandle
GetCurrentProcessId
GetTickCount
GetModuleFileNameW
FormatMessageA
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineW
LocalFree
GetModuleHandleW
ExpandEnvironmentStringsW
GetVersionExW
GetNativeSystemInfo
TerminateProcess
GetExitCodeProcess
OpenProcess
FlushFileBuffers
GetFileInformationByHandle
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointerEx
GetProcessTimes
GetSystemInfo
VirtualQueryEx
IsDebuggerPresent
RaiseException
CreateThread
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
CreateDirectoryW
GetFileAttributesW
GetLongPathNameW
QueryDosDeviceW
RemoveDirectoryW
SetFileAttributesW
GetTempPathW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
MoveFileW
ReplaceFileW
UnregisterWaitEx
RegisterWaitForSingleObject
GetModuleHandleA
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetThreadId
HeapSetInformation
GetModuleHandleExW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
LoadResource
LockResource
SizeofResource
FindResourceW
VirtualQuery
LoadLibraryW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
SetEvent
SetInformationJobObject
ResetEvent
CompareStringW
DecodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
VirtualAllocEx
InitializeCriticalSection
LeaveCriticalSection
TerminateJobObject
GetUserDefaultLCID
WriteProcessMemory
AssignProcessToJobObject
GetFileType
SetHandleInformation
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualProtectEx
QueryFullProcessImageNameW
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
CreateRemoteThread
CreateProcessW
ReadProcessMemory
DebugBreak
lstrlenW
SearchPathW
VirtualProtect
FreeLibrary
LoadLibraryExA
SuspendThread
GetThreadLocale
CreateSemaphoreW
ReleaseSemaphore
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GetVersion
DisconnectNamedPipe
ConnectNamedPipe
UnlockFileEx
LockFileEx
GetUserDefaultUILanguage
ResumeThread
GetEnvironmentVariableW
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
WriteConsoleW
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetACP
GetStdHandle
SetStdHandle
GetFullPathNameW
ExitProcess
GetConsoleMode
GetConsoleCP
PeekNamedPipe
GetDriveTypeW
GetProcessHeap
RtlUnwind
OutputDebugStringW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
InitializeSListHead
GetCurrentThreadId
GetThreadContext
GetSystemDefaultLCID
GetUserDefaultLangID
EnterCriticalSection
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetStartupInfoW
psapi
GetMappedFileNameW
shell32
SHGetKnownFolderPath
SHGetFolderPathW
CommandLineToArgvW
user32
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
CloseDesktop
PostThreadMessageW
PeekMessageW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
timeGetTime
rpcrt4
UuidCreate
winhttp
WinHttpReadData
WinHttpSetTimeouts
WinHttpOpen
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpConnect
WinHttpSendRequest
Exports
Exports
GetHandleVerifier
IsSandboxedProcess
Sections
.text Size: 520KB - Virtual size: 520KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 820B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 291KB - Virtual size: 290KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ