c:\graphviz-ms\bin\dotty.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8f07211a2044d9800164baf66cdcaa49ea9d098b3e45d9ed58400f09895b41be.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8f07211a2044d9800164baf66cdcaa49ea9d098b3e45d9ed58400f09895b41be.exe
Resource
win10v2004-20240226-en
General
-
Target
8f07211a2044d9800164baf66cdcaa49ea9d098b3e45d9ed58400f09895b41be
-
Size
44KB
-
MD5
22ced57d55b7e4aab7617391bcfd9c48
-
SHA1
038b049df4f012b4d90fa1369c3be1f525e418be
-
SHA256
8f07211a2044d9800164baf66cdcaa49ea9d098b3e45d9ed58400f09895b41be
-
SHA512
65f8da05a5af23598a7f24e2f06117ca035f9d892aceb8b718de78e021315a3a9366687aff586d9d8066ab8629aeebf4caddbf7d97fc8218bfa82300ad1a6dd8
-
SSDEEP
768:BGEzYM32A448QGPL4vzZq2o9W7GsxBbPrP8QGPL4vzZq2o9W7GsxBbPr:I4744fGCq2iW7zbfGCq2iW7z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8f07211a2044d9800164baf66cdcaa49ea9d098b3e45d9ed58400f09895b41be
Files
-
8f07211a2044d9800164baf66cdcaa49ea9d098b3e45d9ed58400f09895b41be.exe windows:5 windows x86 arch:x86
f1b0c4efa9f67dd2718bfe3281d3056c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessA
GetModuleFileNameA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
msvcr90
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_initterm
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_stat64i32
memset
getenv
strrchr
exit
sprintf
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
}EQ��u^ Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.htext Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
KQ��u. Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE