C:\fake_exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0c15f8d3abc18627c454ba7498874eb72fb85df767b34c74c293f53b5f12b883.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
0c15f8d3abc18627c454ba7498874eb72fb85df767b34c74c293f53b5f12b883.exe
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
0c15f8d3abc18627c454ba7498874eb72fb85df767b34c74c293f53b5f12b883.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
0c15f8d3abc18627c454ba7498874eb72fb85df767b34c74c293f53b5f12b883.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
0c15f8d3abc18627c454ba7498874eb72fb85df767b34c74c293f53b5f12b883.exe
Resource
win11-20240412-en
General
-
Target
0c15f8d3abc18627c454ba7498874eb72fb85df767b34c74c293f53b5f12b883
-
Size
301KB
-
MD5
4579d8ee904866892ab0c5958aa41086
-
SHA1
e6f156aba9f0dae557dfc61b6375fe1f5ff70420
-
SHA256
0c15f8d3abc18627c454ba7498874eb72fb85df767b34c74c293f53b5f12b883
-
SHA512
8d87f2b3af84ca14c2b52a81deeaeba54c5971f6634d7209e31e584840296597c9f4b53ab4248182bff38bd16dfa50b658e18fb99141c582c5fe1acce1524039
-
SSDEEP
6144:g9GEIDc0vvAhYW0/kNAAnDQGMarrsp/Tvg/3EwmXjAMEmKun1te:gdIRDMNVDQDEsp83EakKo6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c15f8d3abc18627c454ba7498874eb72fb85df767b34c74c293f53b5f12b883
Files
-
0c15f8d3abc18627c454ba7498874eb72fb85df767b34c74c293f53b5f12b883.exe windows:5 windows x86 arch:x86
e8fe6c58a0a1d7d1162ad35656f7aaec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
StrCpyW
StrCmpIW
StrCmpNIW
PathQuoteSpacesW
StrStrIW
StrDupW
PathFindFileNameW
PathFindExtensionW
StrCpyNW
wvnsprintfA
ole32
CoInitializeEx
CoUninitialize
psapi
GetModuleFileNameExW
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
ntdll
_chkstk
memset
NtQueryVirtualMemory
_allshr
ZwQueryInformationProcess
memcpy
_allshl
RtlUnwind
RtlUpcaseUnicodeChar
wcsstr
_stricmp
_aullshr
_allmul
_alldiv
_vsnprintf
_wcslwr
strstr
_aulldiv
shell32
ShellExecuteExA
CommandLineToArgvW
kernel32
GetModuleFileNameW
GetLogicalDriveStringsW
CreateProcessW
GetCommandLineW
GetDriveTypeW
Wow64DisableWow64FsRedirection
AllocConsole
WaitForSingleObject
SetErrorMode
ExitProcess
MoveFileW
GetFileAttributesW
SetFileAttributesW
AttachConsole
GetLocalTime
ExpandEnvironmentStringsW
CreateFileW
QueryPerformanceFrequency
HeapFree
HeapAlloc
GetCommandLineA
WaitForMultipleObjects
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
TerminateProcess
CreateFileMappingW
CreateFileMappingA
TlsSetValue
GetProcAddress
GlobalMemoryStatus
LocalAlloc
GetProcessHeap
GetProcessTimes
GetProcessWorkingSetSize
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetThreadTimes
GetLastError
SetLastError
InitializeCriticalSection
GetTickCount
LoadLibraryA
GetStartupInfoW
QueryPerformanceCounter
LocalFree
GetStdHandle
WriteFile
FlushFileBuffers
lstrlenA
OutputDebugStringA
CreateThread
ExitThread
TerminateThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
Sleep
FindClose
CloseHandle
FileTimeToSystemTime
lstrcpyW
lstrcatW
TlsAlloc
TlsGetValue
FindFirstFileW
FindNextFileW
SetConsoleTitleA
GetFileSize
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointer
SetFilePointerEx
GetFileTime
SetFileTime
MapViewOfFile
UnmapViewOfFile
OpenProcess
user32
wsprintfA
GetDesktopWindow
GetCaretPos
GetCursorPos
GetCapture
GetInputState
GetFocus
GetActiveWindow
GetOpenClipboardWindow
GetProcessWindowStation
GetMessagePos
GetMessageTime
GetClipboardOwner
GetClipboardViewer
GetQueueStatus
advapi32
CryptReleaseContext
CryptGenRandom
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
CryptAcquireContextW
Sections
.text Size: 234KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ