D:\work\icon\bin\icon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e17b2de0a13ced5272e9ea4a276405c8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e17b2de0a13ced5272e9ea4a276405c8.exe
Resource
win10v2004-20240319-en
General
-
Target
e17b2de0a13ced5272e9ea4a276405c8
-
Size
1.6MB
-
MD5
e17b2de0a13ced5272e9ea4a276405c8
-
SHA1
7e3a6bf534b57ef57601bac4769fc5950bac0e84
-
SHA256
3325726488e040ef3e084146353c1e8c55a7f237b873cdcbc01bbafe6f6ebcec
-
SHA512
19920ef27657698e3461bc7f35fd30111b9d2736891602e966acd1552154debaf62ca884396a1acbea880e0862ad0209a2f9bc70424528298696501ac56c1601
-
SSDEEP
49152:Jpn0wg2qnIiggYAkj4UUdowJR/dXh7APDUsL8INP6Ob:Jawg7YBAkCdowJR/gPAmFP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e17b2de0a13ced5272e9ea4a276405c8
Files
-
e17b2de0a13ced5272e9ea4a276405c8.exe windows:5 windows x86 arch:x86
353224f08414512cddba59d083589610
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteFile
LoadLibraryW
SizeofResource
GetLastError
GetProcAddress
LoadLibraryA
GetCurrentProcess
GetModuleHandleA
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
LoadResource
FindResourceA
LockResource
CreateFileA
GetCommandLineA
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
RaiseException
RtlUnwind
SetLastError
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileAttributesExW
HeapFree
HeapSize
CreateDirectoryW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
OutputDebugStringW
HeapReAlloc
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
CreateFileW
user32
MessageBoxA
LoadStringA
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hdplcvj Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE