C:\trunk\Cameyo\Release\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
WinDirStat.cameyo.exe
Resource
win10v2004-20240226-en
General
-
Target
WinDirStat.cameyo.exe
-
Size
5.4MB
-
MD5
f16e0f20a1059e4998307fc3b465c48e
-
SHA1
d12eacffb0510cdabb1b4d71e41095eda9a9bf6b
-
SHA256
1aeadd204334690d1039fde21322ee0158d8a15e3ad7a31b18ad913860f6c1cd
-
SHA512
542016071ec8210c6b0f9975c020bcbe2797d16c923d51f2070eaa23d5d9e5faec6ce0fafa48327396e966766fb451a5045b4d3095ea97907333d3ae755da7e5
-
SSDEEP
98304:d+A7HUCc7TIeBvQD4cTbXO3W5RuU8wgcdDPRhr:wA76Qee5X+3W5RR5v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource WinDirStat.cameyo.exe
Files
-
WinDirStat.cameyo.exe.exe windows:5 windows x86 arch:x86
a6c5ca49bad015e76436cd6a15aef9a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
wininet
InternetCloseHandle
InternetGetLastResponseInfoW
HttpQueryInfoW
InternetReadFile
InternetOpenUrlW
InternetOpenW
advapi32
RegQueryValueW
GetKernelObjectSecurity
LookupPrivilegeValueA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyW
ConvertSidToStringSidW
GetSecurityInfo
RegSetValueExA
CreateServiceW
CloseServiceHandle
DeleteService
OpenSCManagerW
OpenServiceW
RegEnumKeyW
StartServiceW
QueryServiceStatus
ChangeServiceConfigW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
RegEnumValueW
RegCreateKeyExW
RegDeleteKeyW
RegQueryValueExW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
OpenProcessToken
GetSidSubAuthority
GetUserNameW
RegCreateKeyW
GetTokenInformation
EqualSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
LookupPrivilegeValueW
AllocateAndInitializeSid
SetSecurityDescriptorOwner
SetEntriesInAclW
FreeSid
RegSetKeySecurity
GetLengthSid
AdjustTokenPrivileges
EnumDependentServicesW
QueryServiceStatusEx
ControlService
RegSaveKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorSacl
IsTextUnicode
GetSidIdentifierAuthority
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysReAllocStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
OleLoadPicture
OleCreatePictureIndirect
SysFreeString
ole32
CoInitializeEx
GetHGlobalFromStream
CreateStreamOnHGlobal
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
kernel32
GetSystemTime
EnumResourceNamesW
GetFileSize
FreeLibrary
LoadLibraryExW
EndUpdateResourceW
WaitForSingleObjectEx
OpenMutexW
BeginUpdateResourceW
GetCurrentThreadId
GlobalAlloc
MulDiv
ResumeThread
FreeResource
GetCommandLineW
GetComputerNameW
GetStdHandle
GetVersionExW
GetVersion
CompareFileTime
FindFirstFileExW
GetSystemTimeAsFileTime
GetSystemDirectoryW
GetWindowsDirectoryW
GetLongPathNameW
MapViewOfFile
UnmapViewOfFile
SystemTimeToFileTime
WaitNamedPipeW
InitializeCriticalSection
LeaveCriticalSection
GetModuleFileNameW
MultiByteToWideChar
lstrlenW
GetTempPathW
EnterCriticalSection
GetLocalTime
LocalAlloc
GetSystemInfo
SetNamedPipeHandleState
UpdateResourceW
EnumResourceLanguagesW
ReleaseMutex
HeapAlloc
HeapFree
GetProcessHeap
FlushViewOfFile
FlushFileBuffers
OpenFileMappingW
GetLogicalDrives
QueryDosDeviceW
FindResourceExW
GetFileInformationByHandle
VirtualProtect
LocalUnlock
GetPrivateProfileStringW
WritePrivateProfileStringW
LocalLock
DeleteCriticalSection
VirtualFree
VirtualAlloc
GetThreadLocale
GetStartupInfoA
GetLocaleInfoA
GetCommandLineA
UnhandledExceptionFilter
RtlUnwind
RaiseException
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
lstrlenA
lstrcpyW
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatW
WaitForMultipleObjects
VirtualQuery
TerminateThread
SetThreadPriority
ReleaseSemaphore
OpenMutexA
OpenFileMappingA
OpenEventW
OpenEventA
LoadLibraryExA
LoadLibraryA
IsBadWritePtr
IsBadReadPtr
GetVersionExA
GetThreadContext
GetSystemDirectoryA
GetModuleHandleA
GetModuleFileNameA
GetFileAttributesA
GetExitCodeThread
GetCurrentThread
GetCurrentDirectoryW
GetCurrentDirectoryA
InterlockedExchange
FormatMessageA
DuplicateHandle
DeviceIoControl
CreateSemaphoreA
CreateProcessA
CreatePipe
CreateMutexA
CreateFileMappingA
CreateFileA
CreateEventA
InterlockedDecrement
FormatMessageW
lstrcmpW
CompareStringW
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
CompareStringA
GetLocaleInfoW
ConvertDefaultLocale
GlobalFlags
GlobalReAlloc
GlobalHandle
LocalReAlloc
InterlockedIncrement
SetErrorMode
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
ExitThread
HeapSize
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
LCMapStringA
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetStdHandle
WriteConsoleA
RemoveDirectoryW
WriteConsoleW
SetEnvironmentVariableA
SetCurrentDirectoryW
ResetEvent
FileTimeToSystemTime
GetExitCodeProcess
LoadLibraryW
GetTickCount
OutputDebugStringW
SleepEx
CreateProcessW
CreateMutexW
GetEnvironmentVariableW
DisconnectNamedPipe
ReadFile
CreateNamedPipeW
ConnectNamedPipe
CreateThread
GetCurrentProcessId
CreateEventW
SetEvent
WaitForSingleObject
GlobalFree
GlobalUnlock
GlobalLock
DeleteFileW
MoveFileW
GetFileAttributesW
CopyFileW
WriteFile
SetFileAttributesW
FindNextFileW
FreeEnvironmentStringsW
CreateFileMappingW
FindClose
CreateFileW
SetFileTime
CreateDirectoryW
GetEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
GetDriveTypeW
SetFilePointer
FindFirstFileW
ExitProcess
Sleep
CloseHandle
IsWow64Process
SetLastError
TerminateProcess
OpenProcess
WriteProcessMemory
VirtualProtectEx
GetProcAddress
ReadProcessMemory
WideCharToMultiByte
VirtualQueryEx
GetModuleHandleW
ExpandEnvironmentStringsW
LockResource
GetLastError
SizeofResource
GetCurrentProcess
LoadResource
FindResourceW
LocalFree
GetConsoleOutputCP
user32
IsWindowVisible
SetMenu
GetKeyState
MapWindowPoints
GetMessagePos
GetMessageTime
GetForegroundWindow
RemovePropW
GetPropW
SetPropW
GetClassLongW
CallNextHookEx
SetWindowsHookExW
GetCapture
SendDlgItemMessageA
SendDlgItemMessageW
SetCursor
ValidateRect
DestroyMenu
GetSysColorBrush
UnregisterClassW
GetNextDlgTabItem
EndDialog
ScreenToClient
GrayStringW
DrawTextExW
TabbedTextOutW
GetWindowThreadProcessId
IsWindowEnabled
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuW
GetMenuState
CheckMenuItem
CloseDesktop
DispatchMessageA
GetThreadDesktop
GetUserObjectInformationA
GetClassInfoExW
OpenInputDesktop
PeekMessageA
GetKeyboardType
CloseClipboard
GetSystemMenu
DrawTextW
GetLastActivePopup
MessageBeep
DrawIcon
SetFocus
IsDialogMessageW
CreateDialogIndirectParamW
GetAsyncKeyState
GetWindowLongW
EnableMenuItem
EmptyClipboard
GetDlgItem
SetWindowLongW
SetWindowPos
LoadStringW
CheckDlgButton
GetActiveWindow
OpenClipboard
GetSystemMetrics
SetClipboardData
SetWindowTextW
WinHelpW
GetDialogBaseUnits
EndPaint
ClientToScreen
BeginPaint
AdjustWindowRectEx
GetDlgCtrlID
MessageBoxA
GetTopWindow
EnumWindows
GetWindowTextW
GetWindow
SetActiveWindow
TrackPopupMenu
RegisterWindowMessageW
GetMenuItemID
KillTimer
GetSubMenu
LoadMenuW
GetClassNameW
RedrawWindow
IsWindow
SetMenuDefaultItem
DestroyIcon
PostMessageW
SetForegroundWindow
TrackPopupMenuEx
AppendMenuW
GetCursorPos
CreatePopupMenu
RemoveMenu
FillRect
GetDC
SetRect
ReleaseDC
GetSysColor
CopyRect
wsprintfW
DestroyWindow
GetMessageW
PostQuitMessage
LoadCursorW
RegisterClassExW
LoadIconW
GetDesktopWindow
ShowWindow
CreateWindowExW
DefWindowProcW
GetClassInfoW
RegisterClassW
PtInRect
CallWindowProcW
GetMenu
MoveWindow
EnableWindow
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetMenuItemCount
MsgWaitForMultipleObjects
UnhookWindowsHookEx
WaitMessage
TranslateMessage
SystemParametersInfoW
PeekMessageW
DispatchMessageW
GetWindowRect
GetParent
InvalidateRect
UpdateWindow
FindWindowW
SendMessageW
MessageBoxW
GetClientRect
LoadBitmapW
SetTimer
gdi32
CreateSolidBrush
GetStockObject
BitBlt
StretchBlt
DeleteDC
CreateCompatibleDC
GetTextExtentPointA
CreateFontW
CreateDCW
SetBkColor
CreateFontIndirectW
SetTextColor
GetTextExtentPoint32W
CreateBitmap
SaveDC
RestoreDC
SetBkMode
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SetViewportOrgEx
OffsetViewportOrgEx
CreateCompatibleBitmap
ScaleViewportExtEx
DeleteObject
SetWindowExtEx
ScaleWindowExtEx
SetViewportExtEx
SelectObject
GetDeviceCaps
GetTextMetricsA
GetObjectW
GetClipBox
SetMapMode
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
shell32
ShellExecuteExW
ShellExecuteW
CommandLineToArgvW
Shell_NotifyIconW
ExtractAssociatedIconW
SHChangeNotify
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionW
PathFindFileNameW
SHCopyKeyW
msi
ord173
ord217
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
CODE Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 735KB - Virtual size: 734KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 441KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ