D:\pangn\Tech\Windows\windows_3.0\usbdisplay_win_3.1\Release\Launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e04c87e49c2ef0615e918c2d615b228b2b4bce03eedae19527048c8ec567bb9b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e04c87e49c2ef0615e918c2d615b228b2b4bce03eedae19527048c8ec567bb9b.exe
Resource
win10v2004-20240412-en
General
-
Target
e04c87e49c2ef0615e918c2d615b228b2b4bce03eedae19527048c8ec567bb9b
-
Size
228KB
-
MD5
3cb8f0e0c6206d9dffedabd663d9e447
-
SHA1
8e9df7c7eafafeb38e6986d7d2c84f122303a755
-
SHA256
e04c87e49c2ef0615e918c2d615b228b2b4bce03eedae19527048c8ec567bb9b
-
SHA512
2432ca4b6cd5119c4bd5961aa87b2ee735dae7412810e85186061fc416d776cb48da11e669dba610fef4ee12a116c14b6a0227f41503050e02ac076aac7055ec
-
SSDEEP
3072:BrVyzhee7GZ2liipw+Nnpwk8LpQSFHQzvYXrtVX41Eke0F1Eke0vOB:5VY7dRpwu2kgp/FHUI46kr6ku
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e04c87e49c2ef0615e918c2d615b228b2b4bce03eedae19527048c8ec567bb9b
Files
-
e04c87e49c2ef0615e918c2d615b228b2b4bce03eedae19527048c8ec567bb9b.exe windows:6 windows x86 arch:x86
36c0dc4f83267b6812b274d1be0c8044
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MultiByteToWideChar
SetFileAttributesW
DeleteFileW
CloseHandle
GetProcessId
CreateDirectoryW
CopyFileW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
Sleep
GetUserDefaultUILanguage
ReadConsoleW
ReadFile
SetEndOfFile
FlushFileBuffers
CreateFileW
WriteConsoleW
SetFilePointerEx
GetTimeZoneInformation
HeapReAlloc
WideCharToMultiByte
LCMapStringW
CompareStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
OutputDebugStringA
TerminateProcess
GetModuleHandleW
GetLastError
WaitForSingleObject
OutputDebugStringW
GetModuleFileNameW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCurrentProcess
SetErrorMode
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStdHandle
GetConsoleMode
GetConsoleCP
WriteFile
LeaveCriticalSection
HeapFree
EncodePointer
DecodePointer
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FindClose
HeapAlloc
GetFileAttributesExW
CreateThread
GetCurrentThreadId
ExitThread
GetProcAddress
LoadLibraryExW
GetCommandLineW
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
GetProcessHeap
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
GetStringTypeW
FindFirstFileExW
FindNextFileW
SetStdHandle
GetFileType
EnterCriticalSection
SetEnvironmentVariableA
user32
LoadStringW
DispatchMessageW
wsprintfW
GetMessageW
TranslateMessage
DialogBoxParamW
EndDialog
SetWindowPos
GetDesktopWindow
GetWindowRect
EnableWindow
CheckDlgButton
GetDlgItem
SetWindowTextW
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcW
DestroyWindow
PostMessageW
FindWindowW
AllowSetForegroundWindow
CreateWindowExW
RegisterClassExW
LoadIconW
MessageBoxW
advapi32
RegEnumKeyExW
RegSetValueExW
RegDeleteKeyW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegQueryInfoKeyA
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
ole32
CoUninitialize
CoInitialize
hid
HidD_GetHidGuid
setupapi
SetupDiGetClassDevsW
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
SetupDiDestroyDeviceInfoList
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ