d:\dev\Avalanche\Tools\Undibble\Release\Undibble.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e666ef37d042e5e5befc19fc23ac19fd9023a00e18a3857d65f6c1b2a8af753f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e666ef37d042e5e5befc19fc23ac19fd9023a00e18a3857d65f6c1b2a8af753f.exe
Resource
win10v2004-20240226-en
General
-
Target
e666ef37d042e5e5befc19fc23ac19fd9023a00e18a3857d65f6c1b2a8af753f
-
Size
308KB
-
MD5
e4892e72e19d933fdbdb6e266b11483c
-
SHA1
d08990c7346331d9f64fe0936deb3481d202a977
-
SHA256
e666ef37d042e5e5befc19fc23ac19fd9023a00e18a3857d65f6c1b2a8af753f
-
SHA512
47ec9fee036182c49f46f7e5798c8eab356b50cb47100b32a7cb123d497abc2cee84353061a18a786b5a715d4a2bebccae9480a0c3bc861764a5a252959c8177
-
SSDEEP
6144:5IjfxxLbSL6IZFr5+0/s16yttnHz2IQoQ2:5Ij/SGUrEYC1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e666ef37d042e5e5befc19fc23ac19fd9023a00e18a3857d65f6c1b2a8af753f
Files
-
e666ef37d042e5e5befc19fc23ac19fd9023a00e18a3857d65f6c1b2a8af753f.exe windows:4 windows x86 arch:x86
859220504b437bb547e42ddd3d195267
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
LCMapStringA
HeapSize
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
HeapReAlloc
TerminateProcess
GetCommandLineA
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
GetFileSize
VirtualProtect
HeapFree
HeapAlloc
ExitProcess
RtlUnwind
SetErrorMode
GetOEMCP
GetCPInfo
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetShortPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DeleteFileA
MoveFileA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GlobalFlags
InterlockedIncrement
GetCurrentDirectoryA
InterlockedDecrement
GlobalFree
FormatMessageA
FreeResource
GlobalFindAtomA
lstrcatA
lstrcmpW
lstrcpynA
GlobalGetAtomNameA
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
GlobalAddAtomA
GlobalUnlock
MulDiv
SetLastError
GetPrivateProfileStringA
FindResourceA
LoadResource
LockResource
SizeofResource
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
GlobalLock
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
CreateThread
GetCurrentThreadId
WriteFile
ReadFile
CreateFileA
CloseHandle
GlobalAlloc
SetFilePointer
LocalFree
LocalAlloc
GetStringTypeExA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LCMapStringW
user32
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetParent
GetSystemMenu
SetRect
GetMenuItemInfoA
GetSysColorBrush
DestroyIcon
DeleteMenu
WindowFromPoint
KillTimer
SetTimer
SetWindowRgn
DrawIcon
IsRectEmpty
FindWindowA
GetMenuStringA
AppendMenuA
InsertMenuA
LoadCursorA
DestroyCursor
SetCursorPos
SetCapture
RedrawWindow
InflateRect
MoveWindow
SetWindowTextA
IsDialogMessageA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
AdjustWindowRectEx
DeferWindowPos
GetScrollInfo
SetScrollInfo
RegisterClassA
GetDCEx
DefWindowProcA
CallWindowProcA
GetWindowPlacement
GetWindowRect
PtInRect
RegisterWindowMessageA
LoadMenuA
DestroyMenu
GetClassNameA
SetWindowPos
WinHelpA
SetFocus
EqualRect
GetDlgItem
SetWindowLongA
GetDlgCtrlID
GetMenu
UnpackDDElParam
ReuseDDElParam
LoadIconA
GetClassInfoA
SystemParametersInfoA
InvalidateRect
GetClientRect
CharUpperA
DestroyWindow
EnableWindow
GetSystemMetrics
GetSysColor
LoadImageA
FillRect
ReleaseDC
GetCapture
ReleaseCapture
LoadAcceleratorsA
SetActiveWindow
UpdateWindow
IsIconic
InsertMenuItemA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
BringWindowToTop
SetMenu
ShowWindow
IsWindow
GetDesktopWindow
GetWindow
TranslateAcceleratorA
SetMenuItemBitmaps
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
ValidateRect
LockWindowUpdate
UnregisterClassA
GetDC
SendMessageA
GetParent
GetCursorPos
PostMessageA
PeekMessageA
PostQuitMessage
DispatchMessageA
TranslateMessage
PostThreadMessageA
wsprintfA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ScreenToClient
ClientToScreen
GetWindowDC
MessageBoxA
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
ShowOwnedPopups
SetCursor
EndPaint
BeginPaint
gdi32
PatBlt
GetCharWidthA
CreateEllipticRgn
DPtoLP
LPtoDP
Ellipse
CreateRectRgnIndirect
CreateFontIndirectA
SetRectRgn
CombineRgn
GetBkColor
GetDeviceCaps
GetPixel
CreateBitmap
CreatePatternBrush
ScaleWindowExtEx
BitBlt
CreateRectRgn
SelectClipRgn
PtVisible
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
GetStockObject
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateCompatibleBitmap
StretchBlt
GetObjectA
CreateDIBSection
SetStretchBltMode
StretchDIBits
CreateSolidBrush
CreatePen
MoveToEx
LineTo
DeleteObject
SetDIBColorTable
GetDIBColorTable
GetTextExtentPoint32A
TextOutA
CreateCompatibleDC
SelectObject
GetTextMetricsA
GetTextFaceA
DeleteDC
CreateFontA
RectVisible
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
SetFileSecurityA
RegCreateKeyA
RegCloseKey
GetFileSecurityA
shell32
ExtractIconA
DragQueryFileA
DragFinish
SHGetSpecialFolderLocation
SHGetFileInfoA
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
comctl32
ImageList_Draw
ImageList_GetImageInfo
ord17
ImageList_Destroy
shlwapi
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
StrRetToBufA
PathIsUNCA
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ