V:\tbihd\app\x64\Release\tbihd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1b63724b22ad30d44bdef1631ad6f8c29e41437daf13818e709bc42ecbf8617b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b63724b22ad30d44bdef1631ad6f8c29e41437daf13818e709bc42ecbf8617b.exe
Resource
win10v2004-20231215-en
General
-
Target
1b63724b22ad30d44bdef1631ad6f8c29e41437daf13818e709bc42ecbf8617b
-
Size
932KB
-
MD5
ffb363e541bf3c56e6cc411208d96cc0
-
SHA1
0f555852e4b9b5048ab6fed084061906993e6f91
-
SHA256
1b63724b22ad30d44bdef1631ad6f8c29e41437daf13818e709bc42ecbf8617b
-
SHA512
427ebf80ed8f7a1dd71679035a926423dc276a7301e93f79546c5c1534d03e6d461318e2337f6bf04d12bf3c471d3f3d2d7f654606e806e4b5c35d50e077102c
-
SSDEEP
12288:QEW708KkMJ+75/7iW/pWbf/JUrBUMiw20A9hW0VyD/dCX205LRyGbKym+D:ZUYk75OOMf/JT5RryDi20t/KNY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b63724b22ad30d44bdef1631ad6f8c29e41437daf13818e709bc42ecbf8617b
Files
-
1b63724b22ad30d44bdef1631ad6f8c29e41437daf13818e709bc42ecbf8617b.exe windows:6 windows x64 arch:x64
4b8e7762ad8b62f739b7763a6a0fea11
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
shell32
DragFinish
DragQueryFileW
DragAcceptFiles
kernel32
FindNextFileW
DeviceIoControl
GetEnvironmentVariableW
FindClose
CreateFileW
GetVersionExW
CreateEventW
Sleep
GlobalAlloc
DeleteFileW
GlobalFree
CloseHandle
GetOverlappedResult
SetCurrentDirectoryW
GetWindowsDirectoryW
GetProcAddress
GlobalLock
GetModuleHandleW
GlobalUnlock
GetDriveTypeW
GetDiskFreeSpaceExW
GetVolumeInformationW
QueryDosDeviceW
ReadFile
WriteFile
SetLastError
ReleaseMutex
WaitForSingleObject
CreateMutexW
VirtualAlloc
VirtualFree
FreeLibrary
lstrlenW
GetDiskFreeSpaceW
GetModuleFileNameW
LoadLibraryW
GetLocaleInfoW
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceCounter
GetTickCount
FindFirstFileW
GetConsoleMode
SetFilePointer
InitializeCriticalSection
DeleteCriticalSection
VirtualLock
VirtualUnlock
GetFileSize
SetErrorMode
LocalFree
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
FindFirstFileExW
HeapSize
GetTimeZoneInformation
GetOEMCP
GetACP
IsValidCodePage
GetStringTypeW
GetCPInfo
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
GetFileType
HeapFree
HeapReAlloc
GetLogicalDrives
EnterCriticalSection
GetLastError
WriteConsoleW
LeaveCriticalSection
HeapAlloc
GetModuleHandleExW
ExitProcess
GetStdHandle
GetFullPathNameW
QueryPerformanceFrequency
GetCurrentDirectoryW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
user32
EnableWindow
IsIconic
SetForegroundWindow
OemToCharW
GetMessageW
CreateDialogParamW
CallWindowProcW
DestroyWindow
MessageBoxW
GetPropW
SetWindowLongPtrW
SendMessageW
EndDialog
RemovePropW
SetWindowTextW
LoadStringW
ShowWindow
DispatchMessageW
IsDialogMessageW
DefDlgProcW
SetDlgItemTextW
RegisterClassW
GetDlgItemTextW
SetPropW
TranslateMessage
LoadIconW
FindWindowW
LoadCursorW
GetDlgItem
PostQuitMessage
DialogBoxParamW
comdlg32
GetOpenFileNameW
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
ole32
CoInitializeEx
CoUninitialize
setupapi
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
SetupDiGetDeviceInterfaceDetailW
SetupDiDestroyDeviceInfoList
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlNtStatusToDosError
RtlVirtualUnwind
Sections
.text Size: 622KB - Virtual size: 622KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
RT_CODE Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gehcont Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ