H:\PMS\_AUpdate\HanCapture\bin\Release\Agent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b9e25e6b194b5c37c4f06421adae10b78338face1c970e3007d58f02a4b84085.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9e25e6b194b5c37c4f06421adae10b78338face1c970e3007d58f02a4b84085.exe
Resource
win10v2004-20231215-en
General
-
Target
b9e25e6b194b5c37c4f06421adae10b78338face1c970e3007d58f02a4b84085
-
Size
291KB
-
MD5
bd7297e070dcee5bb21be5d78cef8b94
-
SHA1
3b72bca7a4597e62976f4ed5336273f86c5d6c72
-
SHA256
b9e25e6b194b5c37c4f06421adae10b78338face1c970e3007d58f02a4b84085
-
SHA512
e2516f423c9a29ea18c4b791c7d94783231bf511d81d4e0f7d4439bc0749e2c9edd082e22ae8ddd17bf8849205f2a6a1fff605197951ff55b524e7c548d48c32
-
SSDEEP
3072:uyILJKtpYTEbBT6nADhzCf/LBltpUtnJVXe555GK1QlxvHyXKsvW1rBlFHpoE3f:pILJKtpYwbBjDRMLQtJVmqxvIKsAHpfP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9e25e6b194b5c37c4f06421adae10b78338face1c970e3007d58f02a4b84085
Files
-
b9e25e6b194b5c37c4f06421adae10b78338face1c970e3007d58f02a4b84085.exe windows:5 windows x86 arch:x86
9b993965846806f0d55a32d5252b1e92
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateEventW
GetVersionExW
GetModuleHandleW
FindResourceW
SizeofResource
LoadResource
LockResource
FreeResource
CreateToolhelp32Snapshot
GetLastError
Process32FirstW
Process32NextW
OpenProcess
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
CreateRemoteThread
WaitForSingleObject
GetCurrentThreadId
FindResourceExW
WideCharToMultiByte
CreateFileW
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
WriteFile
GetSystemDirectoryW
CreateFileA
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
DeleteFileW
GetModuleFileNameW
GetTempPathW
GetTickCount
CloseHandle
LoadLibraryW
GetCurrentProcess
GetCurrentProcessId
GetFileAttributesW
Sleep
CreateThread
GetProcAddress
GetACP
GetCPInfo
GetStartupInfoA
GetFileType
SetHandleCount
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetStartupInfoW
RtlUnwind
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
VirtualAlloc
HeapCreate
GetStdHandle
GetModuleFileNameA
GetConsoleCP
GetConsoleMode
user32
TranslateMessage
DispatchMessageW
LoadIconW
TranslateAcceleratorW
RegisterClassExW
CreateWindowExW
DefWindowProcW
BeginPaint
GetMessageW
LoadCursorW
GetSystemMetrics
GetWindowDC
PrintWindow
SetCursorPos
SendInput
GetWindowTextW
WindowFromPoint
GetWindowRect
FindWindowW
PostQuitMessage
EndPaint
gdi32
DeleteObject
DeleteDC
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
BitBlt
GetDIBits
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
shell32
ShellExecuteW
ws2_32
WSAStartup
socket
gethostbyname
inet_addr
gethostbyaddr
htons
connect
closesocket
send
recv
Sections
.text Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ