C:\work\servermapper\output\build\mapper_client.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4b67e78d69a4cbf5a02b9f58a6c7b8cffae83e44962d3b714eb8320b1f2cf9bc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b67e78d69a4cbf5a02b9f58a6c7b8cffae83e44962d3b714eb8320b1f2cf9bc.exe
Resource
win10v2004-20240412-en
General
-
Target
4b67e78d69a4cbf5a02b9f58a6c7b8cffae83e44962d3b714eb8320b1f2cf9bc.exe
-
Size
6.3MB
-
MD5
20b40977bf8e122a8c255bbf834c508e
-
SHA1
040d50aa314019169c190b4776e0767e1748aa16
-
SHA256
4b67e78d69a4cbf5a02b9f58a6c7b8cffae83e44962d3b714eb8320b1f2cf9bc
-
SHA512
1a9cc5e438f30cf1d3d07b6a9c16f8fb58e695bda7602b916172d71e6af1e5dae97c0f06c1b5acf399d1fe2b3bc60b4cd3b095039fc0238f015d88da2723ee41
-
SSDEEP
98304:zzRK1KwMbUR67uRzxOYeQH69kfGhZnlRzmOpttXRB9miXiLBU5QvggIPOFep3JnU:zkcwJwu1OYo86Dp9maKKEgsOnb6D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b67e78d69a4cbf5a02b9f58a6c7b8cffae83e44962d3b714eb8320b1f2cf9bc.exe
Files
-
4b67e78d69a4cbf5a02b9f58a6c7b8cffae83e44962d3b714eb8320b1f2cf9bc.exe.exe windows:6 windows x64 arch:x64
e66c49a07225d9021b12b3e7c693af31
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
iphlpapi
GetCurrentThreadCompartmentId
ntdll
RtlVirtualUnwind
NtQuerySystemInformation
RtlPcToFileHeader
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwind
RtlUnwindEx
kernel32
GetLastError
ReadFile
GetFileSizeEx
WriteFile
CreateFileW
HeapFree
GetCurrentThread
HeapReAlloc
HeapAlloc
GetProcessHeap
WideCharToMultiByte
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
SetStdHandle
ReadConsoleW
CheckRemoteDebuggerPresent
IsDebuggerPresent
CreateThread
OpenProcess
GetCurrentProcess
GetProcAddress
GetModuleHandleA
GlobalLock
MultiByteToWideChar
GetTempPathW
GetCurrentProcessId
CloseHandle
Sleep
GetCurrentThreadId
VirtualAlloc
VirtualFree
WriteConsoleW
SetEndOfFile
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetStdHandle
GetModuleFileNameW
ExitProcess
GetFileType
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
DeleteFileW
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
FormatMessageA
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
RaiseException
LocalFree
GetLocaleInfoEx
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesW
GetFileAttributesExW
SetFileInformationByHandle
AreFileApisANSI
GetModuleHandleW
GetFileInformationByHandleEx
QueryPerformanceCounter
QueryPerformanceFrequency
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetStringTypeW
GetCPInfo
InitializeCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
user32
GetDesktopWindow
GetSystemMetrics
DispatchMessageW
GetDC
SetCapture
ReleaseCapture
PeekMessageW
TranslateMessage
MessageBoxA
ReleaseDC
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
advapi32
RegSetKeyValueW
OpenThreadToken
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegCreateKeyW
RegCloseKey
RegDeleteKeyW
RegOpenKeyW
ole32
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
CoInitialize
ws2_32
closesocket
WSAGetLastError
setsockopt
getsockopt
recv
recvfrom
send
sendto
Sections
.text Size: 1013KB - Virtual size: 1012KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 641KB - Virtual size: 742KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vlizer Size: 4.4MB - Virtual size: 15.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE