Z:\Projects\Loader\Release\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7762e8e2020d4ab01becc8290208e7250bac1426dc7bcae9eb0f9f0b3829094f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7762e8e2020d4ab01becc8290208e7250bac1426dc7bcae9eb0f9f0b3829094f.exe
Resource
win10v2004-20240226-en
General
-
Target
7762e8e2020d4ab01becc8290208e7250bac1426dc7bcae9eb0f9f0b3829094f
-
Size
20KB
-
MD5
803bed2042c70ed0fdeb204e037b4d5d
-
SHA1
1ea247b33265438bba2d1739b51eb027f3c91c50
-
SHA256
7762e8e2020d4ab01becc8290208e7250bac1426dc7bcae9eb0f9f0b3829094f
-
SHA512
ff7214dfaaba20f2dfd38ac8498b3c05cd7366c1d8e71d55c4c0fa7b555640d2f87479afb1f1aa85f366e4d1ffe05fddcf5970224b39b673c5113edc7929ab63
-
SSDEEP
384:yIToumyhfQEtex3gVwy8F7/x8H+2AI7W8tpEVk3z:7TKyXtk3hxx8H+lI65az
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7762e8e2020d4ab01becc8290208e7250bac1426dc7bcae9eb0f9f0b3829094f
Files
-
7762e8e2020d4ab01becc8290208e7250bac1426dc7bcae9eb0f9f0b3829094f.exe windows:5 windows x86 arch:x86
d0b8285184365a838ba34f4f2ef57766
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetSetOptionW
HttpSendRequestW
InternetConnectW
InternetReadFile
HttpQueryInfoW
HttpOpenRequestW
InternetQueryOptionW
InternetOpenW
kernel32
HeapCreate
GetModuleFileNameW
DeleteFileW
CloseHandle
GetCurrentDirectoryW
GetTempPathW
lstrlenW
lstrcmpW
ExitProcess
GetFileSize
HeapAlloc
GetModuleHandleW
WriteFile
ReadFile
CreateFileW
user32
wsprintfW
shell32
ShellExecuteW
Sections
.text Size: 1024B - Virtual size: 891B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 154B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ