c:\temp\elance\AutoTransfer2\Release\AutoTransfer2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0a4473c1a3efde4dba58c4cc0f1bb981f04905bbaa97b694cc980ccff5795081.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a4473c1a3efde4dba58c4cc0f1bb981f04905bbaa97b694cc980ccff5795081.exe
Resource
win10v2004-20240226-en
General
-
Target
0a4473c1a3efde4dba58c4cc0f1bb981f04905bbaa97b694cc980ccff5795081
-
Size
231KB
-
MD5
2cf626da0f86b4ca0ce5ff12bbdd50b4
-
SHA1
d56eff34c504aa9f02e013e9bca7c1cd6e7413c0
-
SHA256
0a4473c1a3efde4dba58c4cc0f1bb981f04905bbaa97b694cc980ccff5795081
-
SHA512
f37e5ea14bb574b6f34f3f290400f60b3819b299ef8987ec4c5fc87504304852942a56bf2b39a9e2fa81fd7d929a24649cce47409287648c00e56ee6bedfc5b6
-
SSDEEP
6144:xzayDy8E5ac/wGXHnm8xGUcQaLZ+O9fApDp:Varcqv3m8wUcLN+yEp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a4473c1a3efde4dba58c4cc0f1bb981f04905bbaa97b694cc980ccff5795081
Files
-
0a4473c1a3efde4dba58c4cc0f1bb981f04905bbaa97b694cc980ccff5795081.exe windows:5 windows x86 arch:x86
6a577555daa9296a4fa732ccd0d1f665
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
socket
htonl
htons
WSACleanup
WSAStartup
send
recv
connect
WSAGetLastError
gethostbyname
inet_addr
accept
listen
getsockname
bind
setsockopt
closesocket
kernel32
SetEvent
CloseHandle
CreateEventW
SetLastError
GetLastError
HeapSetInformation
GetModuleFileNameW
Sleep
GetProcessHeaps
SetErrorMode
IsDebuggerPresent
SetConsoleCtrlHandler
WaitForSingleObject
GetProcAddress
CreateFileW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetLogicalDriveStringsW
GetDriveTypeW
ReadFile
GetFileSize
SetFilePointer
SetEndOfFile
InterlockedExchange
GetLocalTime
CreateProcessW
DeleteFileW
DeleteFileA
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FindFirstFileW
FindNextFileW
FindClose
FindFirstFileExW
GetSystemTimeAsFileTime
GetFileType
WriteConsoleW
GetACP
WideCharToMultiByte
WriteFile
GetConsoleOutputCP
WriteConsoleA
GetComputerNameExW
GetComputerNameExA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetExitCodeProcess
CreateProcessA
SetEnvironmentVariableW
FreeEnvironmentStringsA
GetEnvironmentStrings
ReadConsoleInputA
SetConsoleMode
CreateTimerQueueTimer
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
GetModuleHandleW
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
RtlUnwind
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetStdHandle
GetModuleFileNameA
LoadLibraryA
GetCPInfo
GetOEMCP
IsValidCodePage
CreateFileA
SetHandleCount
GetStartupInfoA
SetStdHandle
LCMapStringA
LCMapStringW
GetFileAttributesW
HeapCreate
VirtualFree
VirtualAlloc
GetFileAttributesA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
advapi32
SetServiceStatus
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
DeleteService
QueryServiceStatus
ControlService
OpenServiceW
CloseServiceHandle
StartServiceW
CreateServiceW
OpenSCManagerW
InitializeSecurityDescriptor
ole32
CoUninitialize
CoInitializeEx
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ