E:\workplace\AndroidEmulator\UI_Release_Packet_New\Basic\Client\Output\Binfinal\AndroidEmulator\AndroidEmulatorEn.pdb
Static task
static1
Behavioral task
behavioral1
Sample
21fdb512fe5a3ff8a4d193a9a2c19b0414ce6305c6f500037f43932a2a0153b8.exe
Resource
win7-20240215-en
General
-
Target
21fdb512fe5a3ff8a4d193a9a2c19b0414ce6305c6f500037f43932a2a0153b8
-
Size
8.7MB
-
MD5
e3687089e10a18eeb96466fcaa70565c
-
SHA1
eaf75679ead1097b5257f39a25ebe7e8ad3e8d80
-
SHA256
21fdb512fe5a3ff8a4d193a9a2c19b0414ce6305c6f500037f43932a2a0153b8
-
SHA512
c8f087c9a9c97a6154981d85f133bf5c3ee390fc5be95982d08260b76acaf8e0a0298a0272d69aaabc4028da71b6d6aa730faeebf9d0ed3176bcfad37fb8bf83
-
SSDEEP
98304:QTRlZLSYBsYBDta1C+BwRnQnvLogG4AlfwonvYgNVfDXhCrVlyclFX:QTRpXta1C+BwRnQnzmBwAzNlWD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21fdb512fe5a3ff8a4d193a9a2c19b0414ce6305c6f500037f43932a2a0153b8
Files
-
21fdb512fe5a3ff8a4d193a9a2c19b0414ce6305c6f500037f43932a2a0153b8.exe windows:6 windows x86 arch:x86
1cf5b5ca1ea4d40beda14254e5ac571b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntdll
RtlUnwind
VerSetConditionMask
NtQueryInformationProcess
NtCallbackReturn
NtMapViewOfSection
NtUnmapViewOfSection
NtWriteVirtualMemory
NtProtectVirtualMemory
NtReadVirtualMemory
NtOpenProcess
NtCreateSection
NtQueryVirtualMemory
NtQuerySystemInformation
NtQueryValueKey
RtlNtStatusToDosError
RtlFreeHeap
NtClose
RtlInitUnicodeString
NtOpenKey
RtlAllocateHeap
NtEnumerateKey
kernel32
TlsGetValue
WriteConsoleW
SetFilePointerEx
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
ReadFile
WriteFile
SetFilePointer
CreateFileW
CloseHandle
GetFileSize
HeapFree
DeviceIoControl
CreateMutexW
WaitForSingleObject
ReleaseMutex
HeapAlloc
GetProcessHeap
WideCharToMultiByte
GetVersionExW
MultiByteToWideChar
LoadLibraryW
GetLastError
QueryDosDeviceW
GetModuleFileNameW
GetLogicalDriveStringsW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetCurrentProcess
GetWindowsDirectoryA
GetProcAddress
GetModuleHandleW
IsWow64Process
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Sleep
Process32NextW
LoadLibraryA
Process32FirstW
GetTickCount
IsBadReadPtr
ExpandEnvironmentStringsW
GetSystemDirectoryW
WriteProcessMemory
VirtualProtect
ReadProcessMemory
GetCurrentThreadId
ResumeThread
ExitThread
GetCurrentThread
TerminateThread
Thread32Next
Thread32First
SuspendThread
GetCurrentProcessId
OpenThread
TerminateProcess
WaitForMultipleObjects
CreateThread
VirtualAlloc
VirtualQuery
TlsSetValue
VirtualFree
GetCommandLineW
RegisterWaitForSingleObject
SetEnvironmentVariableW
GetEnvironmentVariableW
GetFileAttributesW
OpenFileMappingW
UnmapViewOfFile
TlsAlloc
GetWindowsDirectoryW
ExitProcess
CreateProcessW
FreeLibrary
VerifyVersionInfoW
GetSystemTimeAsFileTime
CreateFileMappingW
MapViewOfFile
GetProcessTimes
FindFirstFileExA
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetStdHandle
GetACP
GetModuleFileNameA
GetModuleHandleExW
LoadLibraryExW
InterlockedFlushSList
RaiseException
SetThreadContext
GetThreadContext
HeapReAlloc
GetThreadPriority
SetThreadPriority
HeapCreate
CreateMutexA
GetCPInfo
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsFree
LCMapStringW
GetLocaleInfoW
user32
GetWindowThreadProcessId
FindWindowExA
IsWindowVisible
GetClassNameW
psapi
GetModuleFileNameExW
ws2_32
sendto
socket
getaddrinfo
WSAStartup
htonl
htons
freeaddrinfo
WSACleanup
Exports
Exports
AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
Sections
.text Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 694KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 193B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tvm0 Size: - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 403KB - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ace0 Size: 793KB - Virtual size: 792KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ace1 Size: 245KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ace2 Size: 5.0MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ace3 Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE