C:\Users\jens.IMAGIC\Git\HEAD\repos\cpp\C++\Projects\launcher\source\bin\Client_Win32\Launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b9920f99561d9f3a07669e8c360841590fe5e6110aabc03c715acc344a7509a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9920f99561d9f3a07669e8c360841590fe5e6110aabc03c715acc344a7509a2.exe
Resource
win10v2004-20240226-en
General
-
Target
b9920f99561d9f3a07669e8c360841590fe5e6110aabc03c715acc344a7509a2
-
Size
918KB
-
MD5
624f35b2883603c8330c88cac1148b03
-
SHA1
254db459077cf4824bcb00082b48824875b250c8
-
SHA256
b9920f99561d9f3a07669e8c360841590fe5e6110aabc03c715acc344a7509a2
-
SHA512
e48e9bf322fca6214d13b50e52b846e0c648904cbb7fa1d83d1205c8a33d8540db461b5cdffd73211d0b86544eae6f9bc32a2abfbdddd9d7b7818b1bb64f98ca
-
SSDEEP
24576:KWwgLj24vW+pGY8ir31JKH5tkYqtikWydbWC:C4vW+pGY8iWHHqtiSA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9920f99561d9f3a07669e8c360841590fe5e6110aabc03c715acc344a7509a2
Files
-
b9920f99561d9f3a07669e8c360841590fe5e6110aabc03c715acc344a7509a2.exe windows:6 windows x86 arch:x86
5152768987c76fda4a72966893edc1a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetCurrentThreadId
FreeLibrary
LoadResource
SizeofResource
FindResourceW
lstrcmpiW
MultiByteToWideChar
GetEnvironmentVariableW
GetCurrentDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetFullPathNameW
GetSystemDirectoryW
FormatMessageA
ReadConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetLastError
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
SetConsoleCtrlHandler
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileSizeEx
GetFileType
GetCurrentThread
WriteFile
GetStdHandle
ExitProcess
MoveFileExW
DeleteFileW
RemoveDirectoryW
GetDriveTypeW
GetModuleHandleExW
FreeLibraryAndExitThread
RaiseException
DecodePointer
lstrlenW
GetModuleHandleW
GetModuleFileNameW
CloseHandle
CreateMutexW
SetCurrentDirectoryW
GetCommandLineW
LocalFree
LoadLibraryExW
GetProcAddress
GetLastError
ExpandEnvironmentStringsW
GetCommandLineA
SetEnvironmentVariableW
ResumeThread
ExitThread
CreateThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedFlushSList
RtlUnwind
LoadLibraryExA
WideCharToMultiByte
GetStringTypeW
CreateDirectoryW
CreateFileW
FindFirstFileExW
GetDiskFreeSpaceExW
GetFileAttributesExW
GetFileInformationByHandle
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
SetFileTime
GetTempPathW
AreFileApisANSI
CopyFileW
CreateHardLinkW
CreateSymbolicLinkW
WaitForSingleObjectEx
Sleep
SwitchToThread
GetExitCodeThread
GetNativeSystemInfo
EncodePointer
LCMapStringEx
QueryPerformanceCounter
QueryPerformanceFrequency
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
SetFileInformationByHandle
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetFileInformationByHandleEx
GetLocaleInfoEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
OutputDebugStringW
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
VirtualAlloc
VirtualFree
WriteConsoleW
user32
GetMessageW
MessageBoxW
IsWindow
TranslateMessage
GetMonitorInfoW
MonitorFromWindow
LoadCursorW
LoadBitmapW
GetWindow
GetParent
MapWindowPoints
GetWindowRect
GetClientRect
EndPaint
BeginPaint
DispatchMessageW
CharNextW
SetWindowPos
UpdateWindow
GetClassInfoExW
RegisterClassExW
UnregisterClassW
CallWindowProcW
FindWindowExW
SetWindowLongW
GetWindowLongW
DestroyWindow
CreateWindowExW
RegisterClassW
PostQuitMessage
DefWindowProcW
SendMessageW
gdi32
SelectObject
DeleteObject
DeleteDC
CreateCompatibleDC
BitBlt
GetObjectW
advapi32
RegQueryInfoKeyW
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
shell32
CommandLineToArgvW
ole32
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
SysFreeString
VarUI4FromStr
Sections
.text Size: 625KB - Virtual size: 624KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ