iedw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
caabfa7e68320180684ae01e8876b16a.exe
Resource
win7-20240215-en
General
-
Target
caabfa7e68320180684ae01e8876b16a
-
Size
166KB
-
MD5
caabfa7e68320180684ae01e8876b16a
-
SHA1
0e76f3e0bb9e810bb182d5f290d409eeb85f193e
-
SHA256
cb5ddafe26c70a36393e4ab00856139339372b3e39d0040404b2029872e1bbb5
-
SHA512
cd8dd63b13ad9de79f4e1dd81806eaeef47c3faca0e6148f4fe4a41f5e501d94d504bc7a1b52fd1c458dc3f84ea3db2bd4c12a3bca27469251849e6618f9313a
-
SSDEEP
3072:SdKFOoL16AKjtBhepmb/uDkSygOW7ApA5Br:eKF/LAvjde6/uQSwQAO5Br
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource caabfa7e68320180684ae01e8876b16a
Files
-
caabfa7e68320180684ae01e8876b16a.exe windows:6 windows x86 arch:x86
3959c5d315644154f491048fbe913a3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileMappingW
InitializeCriticalSection
HeapSetInformation
SetUnhandledExceptionFilter
GetCommandLineW
MapViewOfFile
CreateFileW
GlobalFree
OpenProcess
DeleteCriticalSection
SetLastError
CreateProcessW
SearchPathW
FindResourceW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
LoadLibraryExW
GetLastError
LoadResource
GetSystemWindowsDirectoryW
DeactivateActCtx
ActivateActCtx
ReleaseActCtx
CreateActCtxW
OpenEventW
CreateEventW
LoadLibraryW
GetProcAddress
FreeLibrary
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
CloseHandle
GetModuleHandleW
UnmapViewOfFile
GetTempPathW
GetTickCount
GetTempFileNameW
SetEvent
GetVersionExW
FindResourceExW
GetModuleFileNameW
gdi32
SetTextColor
GetObjectW
CreateFontIndirectW
SetBkMode
CreatePen
SelectObject
Polyline
DeleteObject
user32
GetAncestor
EndDialog
ShowWindow
GetParent
SendMessageW
PostQuitMessage
PeekMessageW
DispatchMessageW
TranslateMessage
MsgWaitForMultipleObjects
SetWindowLongW
DialogBoxParamW
PostMessageW
MessageBoxW
SendDlgItemMessageW
LoadIconW
LoadImageW
SetDlgItemTextW
GetSysColor
SetWindowPos
GetDlgItem
EnableWindow
LoadStringW
SetWindowTextW
GetSysColorBrush
FillRect
DrawIconEx
GetWindowLongW
msvcrt
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
??_U@YAPAXI@Z
__set_app_type
memcpy
_controlfp
??2@YAPAXI@Z
??_V@YAXPAX@Z
??3@YAXPAX@Z
memset
_vsnwprintf
_wcsnicmp
_wcsicmp
__p__fmode
bsearch
ntdll
RtlUnwind
shlwapi
ord437
SHStrDupW
ord219
PathFindFileNameW
PathRemoveFileSpecW
PathAppendW
PathQuoteSpacesW
StrCmpW
ord158
StrToIntW
ord172
shell32
ord28
ord16
ExtractIconExW
CommandLineToArgvW
SHCreateShellItem
SHGetDesktopFolder
ord152
ord17
dbghelp
MiniDumpReadDumpStream
MiniDumpWriteDump
oleaut32
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
ole32
CreateBindCtx
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
shdocvw
ord159
iertutil
ord32
sfc
SfcIsFileProtected
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 99KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE