D:\TxProject\PCBzProjects\DeskbandMount_1st\Release\DeskbandMount.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aa40564c05ffe0f715d2b697f0f72e47b3a167beab56a9eabd908d33041f1a30.exe
Resource
win7-20240221-en
General
-
Target
aa40564c05ffe0f715d2b697f0f72e47b3a167beab56a9eabd908d33041f1a30
-
Size
323KB
-
MD5
a584fe370c1e0364748ea014092c2feb
-
SHA1
eb579d31911aebe5d9deddaed6cbd1e147be7722
-
SHA256
aa40564c05ffe0f715d2b697f0f72e47b3a167beab56a9eabd908d33041f1a30
-
SHA512
4a2342c8936231d54d6a9188e6580f5031fa9392bbc8b6b2d44c48d5cc0e8a925bb86cb1b0e18622e7bb1cb5a557119650b2a59cf307a2c658d835d9656d2713
-
SSDEEP
6144:GN+p6msSADhKwG5SVGcBmjIb/P/DlKE+7m0aL3JznV:G+6msSADGIFBmkb/3D9+7gzV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa40564c05ffe0f715d2b697f0f72e47b3a167beab56a9eabd908d33041f1a30
Files
-
aa40564c05ffe0f715d2b697f0f72e47b3a167beab56a9eabd908d33041f1a30.exe windows:5 windows x86 arch:x86
b03878a18833d48f58aaee34eeb4716b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindResourceA
FreeLibrary
LoadResource
UpdateResourceA
EndUpdateResourceW
EnumResourceTypesA
SizeofResource
EnumResourceLanguagesA
SetLastError
BeginUpdateResourceW
LoadLibraryA
LockResource
BeginUpdateResourceA
UpdateResourceW
EnumResourceNamesA
EndUpdateResourceA
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
GetModuleHandleW
OpenProcess
WaitForSingleObject
GetVersionExW
TerminateProcess
GetProcAddress
Process32FirstW
GetSystemInfo
GetModuleFileNameA
Process32NextW
CreateToolhelp32Snapshot
CreateProcessA
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
GetExitCodeProcess
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateThread
Sleep
GetFileAttributesA
CloseHandle
GetLastError
CreateFileW
ReadFile
WriteFile
SetFilePointer
LoadLibraryW
CreateFileA
GetProcessHeap
GetLocaleInfoW
HeapSize
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetACP
GetConsoleMode
GetConsoleCP
SetStdHandle
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStartupInfoW
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InterlockedExchange
GetCommandLineW
HeapSetInformation
HeapFree
GetSystemTimeAsFileTime
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
HeapAlloc
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
SetUnhandledExceptionFilter
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
user32
GetSystemMetrics
PostMessageW
advapi32
OpenProcessToken
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
ShellExecuteA
ws2_32
WSAStartup
connect
inet_ntoa
htons
recv
getsockopt
send
gethostbyname
closesocket
__WSAFDIsSet
select
socket
netapi32
Netbios
Sections
.text Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE