E:\ThirdAddTry\Release\ThirdAddTry.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e131628ec52c8bbea53a6fe964cbf763.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e131628ec52c8bbea53a6fe964cbf763.exe
Resource
win10v2004-20240226-en
General
-
Target
e131628ec52c8bbea53a6fe964cbf763
-
Size
251KB
-
MD5
e131628ec52c8bbea53a6fe964cbf763
-
SHA1
7dcbc2742f371a0df54c070140ce66005b890bf6
-
SHA256
aff52e5af4ab4cd6dfadabc9d6c69e84a4e44348cb435ce85f39ad28cdb0e71a
-
SHA512
72314e97ffe23a5aec2a33db4746ab40df0ab02696aa9f3a8e155fd76d990ca6120829fecca6df6b1f8d3c5b743c3ed340474955d7cc435115cdc5ef07fd8cfd
-
SSDEEP
6144:avaAy2jAUzvna6qNbYjf0nwQ4TAC2qvZYOcvb1:IaAy20UzveSjcwQ7C242T1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e131628ec52c8bbea53a6fe964cbf763
Files
-
e131628ec52c8bbea53a6fe964cbf763.exe windows:5 windows x86 arch:x86
595c53f5d5e7b63801f35fe6ba277089
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcmpA
GetLocalTime
DeleteFileA
GetPrivateProfileStringA
lstrcpyA
lstrcatA
GetTempPathA
ProcessIdToSessionId
ExpandEnvironmentStringsA
LoadLibraryA
GetProcAddress
Sleep
GetStdHandle
GetFileType
WaitForMultipleObjects
PeekNamedPipe
ReadFile
FormatMessageA
WaitForSingleObject
VerSetConditionMask
VerifyVersionInfoA
lstrlenA
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EncodePointer
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
SleepEx
CloseHandle
FreeLibrary
OpenProcess
IsProcessorFeaturePresent
user32
wsprintfA
advapi32
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptDestroyKey
CryptEncrypt
CryptReleaseContext
CryptImportKey
StartServiceCtrlDispatcherA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegSetValueExA
RegQueryValueExA
CryptDestroyHash
CryptAcquireContextA
OpenProcessToken
GetTokenInformation
LookupPrivilegeValueA
DuplicateTokenEx
CreateProcessAsUserA
RegOpenKeyExA
RegCloseKey
RegCreateKeyA
msvcr100
isprint
islower
_stat64
toupper
isupper
_gmtime64
fseek
fflush
getenv
_open
_lseeki64
_fstat64
memchr
_getpid
isspace
isalnum
__sys_nerr
strerror
_beginthreadex
fputc
isdigit
fgets
fputs
qsort
_strtoi64
isgraph
strtoul
strstr
isxdigit
strncmp
isalpha
strrchr
strtol
memcpy
strncpy
strchr
__iob_func
fread
sscanf
__CxxFrameHandler3
tolower
_time64
_errno
memset
malloc
free
realloc
calloc
_stricmp
_read
_write
_close
strpbrk
_strdup
_controlfp_s
_invoke_watson
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
__initenv
exit
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?what@exception@std@@UBEPBDXZ
fclose
fwrite
fopen
printf
sprintf
??_U@YAPAXI@Z
??2@YAPAXI@Z
??0exception@std@@QAE@ABV01@@Z
memmove
??3@YAXPAX@Z
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
_strnicmp
_CxxThrowException
atoi
msvcp100
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
userenv
CreateEnvironmentBlock
wtsapi32
WTSQueryUserToken
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
DeleteUrlCacheEntry
psapi
GetProcessImageFileNameA
EnumProcesses
ws2_32
getsockopt
bind
ntohs
getsockname
setsockopt
WSAIoctl
send
recv
select
WSAGetLastError
__WSAFDIsSet
WSASetLastError
WSAStartup
WSACleanup
getpeername
closesocket
socket
connect
freeaddrinfo
getaddrinfo
sendto
recvfrom
accept
gethostname
listen
ioctlsocket
htons
wldap32
ord27
ord301
ord46
ord33
ord35
ord32
ord200
ord30
ord26
ord50
ord60
ord211
ord143
ord22
ord41
ord79
iphlpapi
GetAdaptersInfo
Sections
.text Size: 202KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ