D:\IA_CODEBASE\ia\main\lax\lax_gui_highest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
38588903750b5a530175e38d220e40e20e24d7624c4d061e23f025b2221470e4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
38588903750b5a530175e38d220e40e20e24d7624c4d061e23f025b2221470e4.exe
Resource
win10v2004-20231215-en
General
-
Target
38588903750b5a530175e38d220e40e20e24d7624c4d061e23f025b2221470e4
-
Size
592KB
-
MD5
b49d1b949dadd08ac9646d9396c51918
-
SHA1
6c672d8f29655a74c825dd452c5e7e82df079082
-
SHA256
38588903750b5a530175e38d220e40e20e24d7624c4d061e23f025b2221470e4
-
SHA512
a5a98eb520d6503b10d4a758d18b4344c8c5a8940f5d315a48a7cb51e63b8e19232f8c95b1a0ac3998af30ad17532e5278dfeff07e08c0e018647a642f096ad6
-
SSDEEP
12288:bZHQvcYzjCMRpCnWKJHsbvJaIyxdDWW8LhUUe7GuL:9QvCM3CnLsbBj4gt2UequL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38588903750b5a530175e38d220e40e20e24d7624c4d061e23f025b2221470e4
Files
-
38588903750b5a530175e38d220e40e20e24d7624c4d061e23f025b2221470e4.exe windows:6 windows x86 arch:x86
fc79f004e83c47d4a0f10fd2ef424532
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
kernel32
K32GetMappedFileNameW
MapViewOfFile
WriteFile
SetFileTime
SetFilePointer
LocalFileTimeToFileTime
SystemTimeToFileTime
InitializeCriticalSectionEx
DecodePointer
DeleteCriticalSection
CreatePipe
GetModuleHandleA
FreeLibrary
LoadLibraryA
GetOEMCP
GetACP
UnmapViewOfFile
HeapReAlloc
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
ExitThread
GetConsoleOutputCP
GetUserDefaultLCID
OpenFile
ExitProcess
IsValidLocale
HeapFree
HeapAlloc
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
CreateThread
GetFileType
SetStdHandle
FindFirstFileExW
SetEvent
TerminateProcess
SetLastError
SetConsoleCtrlHandler
FindClose
ReadFile
GetLogicalDrives
GetExitCodeProcess
WaitForSingleObject
LocalFree
GetCurrentThread
SetEndOfFile
LocalAlloc
GetCurrentProcess
GetFileSize
CloseHandle
GetLastError
AllocConsole
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
RaiseException
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
GetStdHandle
GetCommandLineW
GetCommandLineA
GetProcessHeap
HeapSize
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
EncodePointer
LCMapStringEx
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
wininet
InternetConnectW
InternetCloseHandle
InternetCrackUrlW
InternetReadFile
InternetOpenW
FtpGetFileSize
HttpQueryInfoW
FtpOpenFileW
InternetOpenUrlW
comctl32
InitCommonControlsEx
user32
SetTimer
KillTimer
SetForegroundWindow
ShowWindow
PostQuitMessage
GetKeyState
SetActiveWindow
EndDialog
gdi32
GetStockObject
advapi32
RegCloseKey
LookupAccountNameW
LookupAccountSidW
OpenThreadToken
FreeSid
OpenProcessToken
GetNamedSecurityInfoW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
GetAce
EqualSid
AllocateAndInitializeSid
GetTokenInformation
shell32
CommandLineToArgvW
netapi32
NetApiBufferFree
NetUserGetLocalGroups
authz
AuthzFreeContext
AuthzInitializeContextFromSid
AuthzInitializeResourceManager
AuthzFreeResourceManager
AuthzAccessCheck
Sections
.text Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ