E:\workplace\AndroidEmulator\UI_Release_Packet_New\Basic\Client\Output\Binfinal\AndroidEmulator\AndroidEmulatorEn.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dd37a666ac6681d1270339b99c87fae95981c916b7c3598020c906c46d51ef5f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dd37a666ac6681d1270339b99c87fae95981c916b7c3598020c906c46d51ef5f.exe
Resource
win10v2004-20240226-en
General
-
Target
dd37a666ac6681d1270339b99c87fae95981c916b7c3598020c906c46d51ef5f
-
Size
4.8MB
-
MD5
f21f235079dad9bddfbe61104e397647
-
SHA1
c43b61af327667e572f0603c8d6c5fdc5875cc13
-
SHA256
dd37a666ac6681d1270339b99c87fae95981c916b7c3598020c906c46d51ef5f
-
SHA512
e9e276d0d01797ce05d9f882322eafd25fbf26565ce52718b1b4d38eaf5794a78e6e70219d9ee3d1c0a2bb921241443564e34094601c7b0c768d5503b4d88c67
-
SSDEEP
49152:gTLdllass3jl3CxNh1JD8/Z45pez/NeH30ear3aNuS5/ttz:gTRl23CXX8/ZNMH30earqNZ/b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd37a666ac6681d1270339b99c87fae95981c916b7c3598020c906c46d51ef5f
Files
-
dd37a666ac6681d1270339b99c87fae95981c916b7c3598020c906c46d51ef5f.exe windows:6 windows x86 arch:x86
1cf5b5ca1ea4d40beda14254e5ac571b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntdll
RtlUnwind
VerSetConditionMask
NtQueryInformationProcess
NtCallbackReturn
NtMapViewOfSection
NtUnmapViewOfSection
NtWriteVirtualMemory
NtProtectVirtualMemory
NtReadVirtualMemory
NtOpenProcess
NtCreateSection
NtQueryVirtualMemory
NtQuerySystemInformation
NtQueryValueKey
RtlNtStatusToDosError
RtlFreeHeap
NtClose
RtlInitUnicodeString
NtOpenKey
RtlAllocateHeap
NtEnumerateKey
kernel32
TlsGetValue
WriteConsoleW
SetFilePointerEx
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
ReadFile
WriteFile
SetFilePointer
CreateFileW
CloseHandle
GetFileSize
HeapFree
DeviceIoControl
CreateMutexW
WaitForSingleObject
ReleaseMutex
HeapAlloc
GetProcessHeap
WideCharToMultiByte
GetVersionExW
MultiByteToWideChar
LoadLibraryW
GetLastError
QueryDosDeviceW
GetModuleFileNameW
GetLogicalDriveStringsW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetCurrentProcess
GetWindowsDirectoryA
GetProcAddress
GetModuleHandleW
IsWow64Process
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Sleep
Process32NextW
LoadLibraryA
Process32FirstW
GetTickCount
IsBadReadPtr
ExpandEnvironmentStringsW
GetSystemDirectoryW
WriteProcessMemory
VirtualProtect
ReadProcessMemory
GetCurrentThreadId
ResumeThread
ExitThread
GetCurrentThread
TerminateThread
Thread32Next
Thread32First
SuspendThread
GetCurrentProcessId
OpenThread
TerminateProcess
WaitForMultipleObjects
CreateThread
VirtualAlloc
VirtualQuery
TlsSetValue
VirtualFree
GetCommandLineW
RegisterWaitForSingleObject
SetEnvironmentVariableW
GetEnvironmentVariableW
GetFileAttributesW
OpenFileMappingW
UnmapViewOfFile
TlsAlloc
GetWindowsDirectoryW
ExitProcess
CreateProcessW
FreeLibrary
VerifyVersionInfoW
GetSystemTimeAsFileTime
CreateFileMappingW
MapViewOfFile
GetProcessTimes
FindFirstFileExA
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetStdHandle
GetACP
GetModuleFileNameA
GetModuleHandleExW
LoadLibraryExW
InterlockedFlushSList
RaiseException
SetThreadContext
GetThreadContext
HeapReAlloc
GetThreadPriority
SetThreadPriority
HeapCreate
CreateMutexA
GetCPInfo
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsFree
LCMapStringW
GetLocaleInfoW
user32
GetWindowThreadProcessId
FindWindowExA
IsWindowVisible
GetClassNameW
psapi
GetModuleFileNameExW
ws2_32
sendto
socket
getaddrinfo
WSAStartup
htonl
htons
freeaddrinfo
WSACleanup
Exports
Exports
AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
Sections
.text Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 708KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 193B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tvm0 Size: - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 403KB - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ace0 Size: 793KB - Virtual size: 792KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ace1 Size: 245KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ace2 Size: 5.0MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ace3 Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ