C:\projects\open-shell-menu\build\bin\Setup64\StartMenu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
StartMenu.exe
Resource
win10v2004-20240226-en
General
-
Target
StartMenu.exe
-
Size
259KB
-
MD5
9aca92d31344210995d18ac75f7df752
-
SHA1
fec9f414f3c399f8384ad6a32d0b60adde85d8d9
-
SHA256
df5fe5f0b4e28d0e555e20764fe78fdf99970271b87f42e81b208e2fee9e31cf
-
SHA512
ddfb706f8d0b96350a2e2d527428b2e02d0715e33e9d4e16f1add62f1cd6b1da1ff3ed2ac4cf26e40625c7b94738ab9f109709b3f2f91b9298ec720a304470dc
-
SSDEEP
3072:ig7d8wyAkrLFSIgkwXHUjr1C1wJEr4QQzESmW8QK/fvuTjk/qPNujU2bx47J6VJV:igaVSxkwXHUjr1qq/dsws4dobwVQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource StartMenu.exe
Files
-
StartMenu.exe.exe windows:6 windows x64 arch:x64
a6969dcb6d170b8544b71ed8ba3dbe5f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
FormatMessageW
SetCurrentDirectoryW
SetUnhandledExceptionFilter
CreateMutexW
ReleaseMutex
RaiseException
SetLastError
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
DecodePointer
GetProcessHeap
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetModuleFileNameW
GetFileAttributesW
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
InitializeCriticalSectionEx
DeleteCriticalSection
WriteConsoleW
GetConsoleOutputCP
FlushFileBuffers
SetStdHandle
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetLastError
CloseHandle
K32GetModuleFileNameExW
OpenProcess
Sleep
ExpandEnvironmentStringsW
GetModuleHandleW
GetProcAddress
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetStringTypeW
GetConsoleMode
SetFilePointerEx
GetFileType
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
RtlUnwindEx
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
FindResourceW
LoadResource
LockResource
LoadLibraryExW
FreeLibrary
GetVersion
FindFirstFileW
FindClose
GetCPInfo
OutputDebugStringW
MultiByteToWideChar
WideCharToMultiByte
GetLocaleInfoEx
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
VirtualAlloc
VirtualFree
LoadLibraryExA
IsDebuggerPresent
LocalFree
FormatMessageA
CreateDirectoryW
CreateFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
SetFileInformationByHandle
DeviceIoControl
CopyFileW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
InitializeCriticalSectionAndSpinCount
user32
UnhookWindowsHookEx
CreateWindowExW
LoadCursorW
GetClassInfoExW
RegisterClassExW
DestroyWindow
GetMessageW
IsWindow
ChangeWindowMessageFilter
AllowSetForegroundWindow
GetUserObjectInformationW
GetThreadDesktop
DispatchMessageW
TranslateMessage
PeekMessageW
MessageBoxW
KillTimer
SetTimer
PostQuitMessage
RegisterWindowMessageW
UnregisterClassW
CallWindowProcW
DefWindowProcW
GetWindowLongPtrW
SetWindowLongPtrW
PostMessageW
SetWindowsHookExW
GetWindowThreadProcessId
FindWindowExW
FindWindowW
advapi32
GetUserNameW
RegSetValueExW
RegQueryValueExW
RegCopyTreeW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteW
SHEvaluateSystemCommandTemplate
ShellExecuteExW
DoEnvironmentSubstW
ole32
CoInitialize
CoUninitialize
OleInitialize
OleUninitialize
CoTaskMemFree
startmenudll
?DllLoadStringEx@@YA?AV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@H@Z
?g_TaskBar@@3PEAUHWND__@@EA
?ToggleStartMenu@@YAPEAUHWND__@@H_N@Z
?FindTaskBar@@YAPEAUHWND__@@K@Z
?DllLogToFile@@YAXPEB_W0ZZ
?WaitDllInitThread@@YAXXZ
?DllGetSettingBool@@YA_NPEB_W@Z
?DllGetSettingInt@@YAHPEB_W@Z
?DllExecuteNamedCommand@@YA_NPEB_W@Z
?DllImportSettingsXml@@YA_NPEB_W@Z
?DllExportSettingsXml@@YA_NPEB_W@Z
?MiniDumpType@@3W4_MINIDUMP_TYPE@@A
?TopLevelFilter@@YAJPEAU_EXCEPTION_POINTERS@@@Z
?DllUpdateSettings@@YAXXZ
?InitManagers@@YAX_N@Z
?CloseManagers@@YAX_N@Z
?HookInject@@YA_JH_K_J@Z
shlwapi
PathFindFileNameW
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ