C:\Users\Martin\Desktop\fontes\rust\target\debug\deps\birl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6032848354S.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6032848354S.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
~~.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
~~.exe
Resource
win10v2004-20240226-en
General
-
Target
ae66e71538e6e4a1ba24e0cc180c4a8997ac44902c6b3979428dbc3df85e801e.zip
-
Size
3.3MB
-
MD5
b48c8bf75b7403f2b00bda0c60d8d6e8
-
SHA1
25ae97764cecb28d12272ecbcb29ddb7814132d9
-
SHA256
ae66e71538e6e4a1ba24e0cc180c4a8997ac44902c6b3979428dbc3df85e801e
-
SHA512
7d062b777153286ff3da6dd9d03fb997e3ac761918f2b1e1b47527604c520f2514c04f0faa28d2b47f323a8ab6e577ae05ecb7ff9f43555b72c7c1e30b7f94e1
-
SSDEEP
98304:W/0EPbKHv8J331UX8Z51O9rKgJSAJ/vM8p:4mHNsFQrRdZ5p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6032848354S.exe
Files
-
ae66e71538e6e4a1ba24e0cc180c4a8997ac44902c6b3979428dbc3df85e801e.zip.zip
-
6032848354S.exe.exe windows:6 windows x64 arch:x64
1d8d3a42588a0e1902304b82092a7a72
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
SystemFunction036
RegCloseKey
kernel32
GetSystemInfo
SleepConditionVariableSRW
CreateIoCompletionPort
GetQueuedCompletionStatusEx
PostQueuedCompletionStatus
TryAcquireSRWLockExclusive
SetFileCompletionNotificationModes
ReleaseSRWLockShared
CloseHandle
AcquireSRWLockShared
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
FreeEnvironmentStringsW
DeleteProcThreadAttributeList
CompareStringOrdinal
GetLastError
GetCurrentThreadId
SetThreadStackGuarantee
SwitchToThread
CreateWaitableTimerExW
SetWaitableTimer
WaitForSingleObject
Sleep
RtlCaptureContext
RtlVirtualUnwind
RtlLookupFunctionEntry
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetCurrentProcess
InitializeSListHead
QueryPerformanceFrequency
SetFileInformationByHandle
DuplicateHandle
SetFilePointerEx
GetStdHandle
GetCurrentProcessId
WriteFileEx
SleepEx
TerminateProcess
WakeAllConditionVariable
WakeConditionVariable
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
ReleaseMutex
GetModuleHandleA
GetProcAddress
FindClose
CreateFileW
GetFileInformationByHandle
GetFileInformationByHandleEx
CreateDirectoryW
FindFirstFileW
DeleteFileW
GetFinalPathNameByHandleW
GetConsoleMode
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
GetFullPathNameW
CreateNamedPipeW
ReadFileEx
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
MultiByteToWideChar
WriteConsoleW
CreateThread
GetCurrentThread
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
IsDebuggerPresent
GetSystemTimeAsFileTime
QueryPerformanceCounter
SetHandleInformation
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
AddVectoredExceptionHandler
secur32
FreeCredentialsHandle
EncryptMessage
AcceptSecurityContext
DecryptMessage
DeleteSecurityContext
FreeContextBuffer
QueryContextAttributesW
ApplyControlToken
InitializeSecurityContextW
AcquireCredentialsHandleA
crypt32
CertEnumCertificatesInStore
CertAddCertificateContextToStore
CertOpenStore
CertCloseStore
CertFreeCertificateChain
CertDuplicateCertificateChain
CertVerifyCertificateChainPolicy
CertDuplicateStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateChain
ws2_32
setsockopt
getsockopt
WSAIoctl
getaddrinfo
WSASend
send
recv
getpeername
getsockname
connect
bind
WSASocketW
closesocket
WSAGetLastError
WSAStartup
ioctlsocket
WSACleanup
shutdown
freeaddrinfo
ntdll
RtlNtStatusToDosError
NtDeviceIoControlFile
NtReadFile
NtCancelIoFileEx
NtWriteFile
NtCreateFile
bcrypt
BCryptGenRandom
vcruntime140
_CxxThrowException
memcpy
memset
__current_exception_context
__current_exception
__C_specific_handler
__CxxFrameHandler3
memcmp
memmove
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
malloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
pow
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___argv
_register_onexit_function
_crt_atexit
exit
terminate
_configure_narrow_argv
__p___argc
_initialize_narrow_environment
_set_app_type
_get_initial_narrow_environment
_exit
_initterm
_initialize_onexit_table
_initterm_e
_seh_filter_exe
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 317KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
~~.exe windows:5 windows x86 arch:x86
7e2f200a9ecaa7ee1d0f7298f297d727
Code Sign
08:ad:40:b2:60:d2:9c:4c:9f:5e:cd:a9:bd:93:ae:d9Certificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before29/04/2021, 00:00Not After28/04/2036, 23:59SubjectCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:44:18:e2:de:de:36:dd:29:74:c3:44:3a:fb:5c:e5Certificate
IssuerCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USNot Before02/07/2021, 00:00Not After10/07/2024, 23:59SubjectCN=Google LLC,O=Google LLC,L=Mountain View,ST=California,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
01Certificate
IssuerCN=Unknown issuerNot Before01/01/2013, 10:00Not After01/04/2013, 10:00SubjectCN=Dummy certificateExtended Key Usages
Key Usages
KeyUsageCertSign
05:44:af:f3:94:9d:08:39:a6:bf:db:3f:5f:e5:61:16Certificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before14/07/2023, 00:00Not After13/10/2034, 23:59SubjectCN=DigiCert Timestamp 2023,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
a3:15:89:fe:1d:ff:b1:78:3c:89:06:a3:7d:93:a2:79:77:76:c3:b0:dd:de:8f:40:ee:ce:83:3d:8c:c9:62:1dSigner
Actual PE Digesta3:15:89:fe:1d:ff:b1:78:3c:89:06:a3:7d:93:a2:79:77:76:c3:b0:dd:de:8f:40:ee:ce:83:3d:8c:c9:62:1dDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
TEST_mi_exe_stub.pdb
Imports
kernel32
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
OutputDebugStringW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
LCMapStringW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
ReadFile
CreateFileW
CloseHandle
WriteConsoleW
DecodePointer
GetExitCodeProcess
CreateProcessW
WaitForSingleObject
SetFilePointer
VirtualQuery
CreateDirectoryW
SizeofResource
RemoveDirectoryW
GetEnvironmentVariableW
GetTempPathW
FormatMessageW
GetFileAttributesExW
LockResource
DeleteFileW
FindResourceExW
LoadResource
FindResourceW
HeapDestroy
LocalFree
VerSetConditionMask
CopyFileW
VerifyVersionInfoW
GetTempFileNameW
lstrcmpiW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
shlwapi
PathAppendW
PathCanonicalizeW
PathQuoteSpacesW
ole32
CoUninitialize
CoInitializeEx
shell32
ord680
SHGetFolderPathW
user32
MessageBoxW
CharLowerBuffW
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ