D:\data\landun\workspace\p-3d7f88f5f52b43179dd219a5c6dd1b5c\src\bin\Release_Win32\biz_notify.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ee6b3b55677a2856918756f60629268e15639a1fe4b841c61b53fae465d8d349.exe
Resource
win7-20240221-en
General
-
Target
ee6b3b55677a2856918756f60629268e15639a1fe4b841c61b53fae465d8d349
-
Size
371KB
-
MD5
28882dc1e92334db3bfb82db26708e45
-
SHA1
b29a21b3bab3c8c0faee251808b66a65fe26ba58
-
SHA256
ee6b3b55677a2856918756f60629268e15639a1fe4b841c61b53fae465d8d349
-
SHA512
2a5a8f9c26ebec4def2c0265c75eaa06ecfc1b90685b74658360485233248968578f7307b60171b28ef01301d09b8066db415b362899c1a3d130d93dbb06d87c
-
SSDEEP
6144:xIIIIqB2Yrk4cA7aMAOyxdSFlSb7Eva/7U3y2/mdMsQoc4:kB2YY7MoDFEva/Ai2OdBQM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ee6b3b55677a2856918756f60629268e15639a1fe4b841c61b53fae465d8d349
Files
-
ee6b3b55677a2856918756f60629268e15639a1fe4b841c61b53fae465d8d349.exe windows:6 windows x86 arch:x86
f1379cddd13d5d35f269a568f356aa34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryW
GetProcAddress
GetCurrentProcessId
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCommandLineW
OpenMutexW
LoadLibraryExW
WriteFile
CreateFileW
FormatMessageW
LocalFree
HeapFree
LocalAlloc
OutputDebugStringW
HeapAlloc
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
CreateMutexW
ReleaseMutex
QueryPerformanceCounter
GetSystemDirectoryW
InitializeCriticalSectionEx
EncodePointer
GetSystemTimeAsFileTime
GetStringTypeW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RaiseException
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
ExitProcess
GetStdHandle
GetFileType
HeapReAlloc
LCMapStringW
SetFilePointerEx
GetConsoleMode
IsValidCodePage
GetACP
GetOEMCP
FindFirstFileExW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
HeapSize
GetConsoleOutputCP
WriteConsoleW
GetEnvironmentVariableW
GetCurrentThreadId
FindClose
GetCurrentProcess
FindNextFileW
SetLastError
lstrcmpW
GetLastError
GetProcessId
GetModuleFileNameW
DecodePointer
CloseHandle
AcquireSRWLockExclusive
SetEvent
ReleaseSRWLockExclusive
CreateEventW
WaitForSingleObject
InitOnceExecuteOnce
user32
SendInput
AllowSetForegroundWindow
shell32
ShellExecuteExW
ole32
CoRevokeClassObject
CoReleaseServerProcess
CoAddRefServerProcess
CoRegisterClassObject
CoResumeClassObjects
CoInitializeEx
imm32
ImmDisableIME
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
api-ms-win-core-winrt-error-l1-1-0
RoOriginateError
shlwapi
PathRemoveFileSpecW
PathAppendW
advapi32
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
InitializeAcl
AddAccessAllowedAceEx
GetLengthSid
RegCloseKey
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE