c:\work\ThursdayM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
607d70d7707f5fa34c585fa9843ad9f37b9ea128f72517c74cbf7b3d68be16a7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
607d70d7707f5fa34c585fa9843ad9f37b9ea128f72517c74cbf7b3d68be16a7.exe
Resource
win10v2004-20231215-en
General
-
Target
607d70d7707f5fa34c585fa9843ad9f37b9ea128f72517c74cbf7b3d68be16a7
-
Size
788KB
-
MD5
2fd7069a2f861161289d5b5dbb8697f0
-
SHA1
341bad1ba4deb421b9fde07ef7d3f2cb4976eeea
-
SHA256
607d70d7707f5fa34c585fa9843ad9f37b9ea128f72517c74cbf7b3d68be16a7
-
SHA512
1384398a1c046de174eba435a62bf5f97b019c8c91a73841e414e6928e9b74fb46201cccea06d771a6e9751285f7426bd8d7296e66987fa3718605311039cdf2
-
SSDEEP
12288:qSP2Vu2On5XQlE983JNsUDvlkd73hS3n8H5PGFAyG/Q7wvb:l/2On5XakphS305P4An/9z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 607d70d7707f5fa34c585fa9843ad9f37b9ea128f72517c74cbf7b3d68be16a7
Files
-
607d70d7707f5fa34c585fa9843ad9f37b9ea128f72517c74cbf7b3d68be16a7.exe windows:5 windows x86 arch:x86
b7ebea437c5ce69fa2a675f1af8abccd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindResourceW
LoadResource
WriteFile
InitializeCriticalSectionAndSpinCount
SizeofResource
FindResourceExW
MultiByteToWideChar
GetTempPathW
LockResource
CloseHandle
GetModuleHandleW
CreateFileW
GetTempFileNameW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
RaiseException
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
EncodePointer
DecodePointer
GetCommandLineW
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
Sleep
GetStdHandle
GetModuleFileNameW
SetLastError
InterlockedIncrement
GetCurrentThread
GetCurrentThreadId
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreW
FatalAppExitA
InterlockedExchange
FreeLibrary
LoadLibraryExW
SetConsoleCtrlHandler
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
LoadLibraryW
WideCharToMultiByte
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
FlushFileBuffers
WriteConsoleW
advapi32
RegOpenKeyExW
oleaut32
SysAllocStringLen
mscoree
CorBindToRuntimeEx
Sections
.text Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 587KB - Virtual size: 586KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ