Reader_SL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ca8a4d2df84d2a9cb572af8a7d153da41399af6d8f8fb62b304306a27fb1e4c5.exe
Resource
win7-20240220-en
General
-
Target
ca8a4d2df84d2a9cb572af8a7d153da41399af6d8f8fb62b304306a27fb1e4c5
-
Size
263KB
-
MD5
cb064877c8a5d4b4331c14652dd33f51
-
SHA1
0f01fd00ddcd5913c3901e805d7d691ce5090f81
-
SHA256
ca8a4d2df84d2a9cb572af8a7d153da41399af6d8f8fb62b304306a27fb1e4c5
-
SHA512
cb178a33a213d6f78a02a16e07039ab0925256f9831860756d3af2aa1339713908b90413669e2f8e972e11efac5ad3ed7236db74ee4cce920e87dbc66249ad38
-
SSDEEP
6144:d++wMja4g7X7Y04fQFieh6uSXxM3PEUW9BNQpbFujn8x+37mMBs:d++wMRg7LbFieh6Dx2m9K087K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca8a4d2df84d2a9cb572af8a7d153da41399af6d8f8fb62b304306a27fb1e4c5
Files
-
ca8a4d2df84d2a9cb572af8a7d153da41399af6d8f8fb62b304306a27fb1e4c5.exe windows:6 windows x86 arch:x86
0d6e692aa1463f329a38a8aaa052b69b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateThread
GetCurrentThread
SetThreadPriority
TerminateThread
CreateProcessA
GetModuleFileNameA
GetModuleHandleA
GetSystemPowerStatus
FreeLibrary
GetProcAddress
LoadLibraryA
CreateFileA
CreateFileW
FindClose
FindFirstFileA
FindNextFileA
GetFileAttributesA
GetFinalPathNameByHandleW
ReadFile
CreateEventA
GetCurrentProcess
GetSystemInfo
VirtualQueryEx
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
MultiByteToWideChar
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
WideCharToMultiByte
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
WaitForSingleObject
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetFilePointer
CloseHandle
user32
LoadIconA
GetMessageA
CreateWindowExA
DestroyWindow
SetTimer
KillTimer
FindWindowA
LoadCursorA
RegisterClassExA
UnregisterClassA
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
advapi32
CloseServiceHandle
OpenServiceA
QueryServiceStatus
RegCloseKey
RegOpenKeyA
RegQueryValueA
OpenSCManagerA
shell32
SHGetKnownFolderPath
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoTaskMemFree
msvcp120
?_Syserror_map@std@@YAPBDH@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xbad_alloc@std@@YAXXZ
?_Winerror_map@std@@YAPBDH@Z
msvcr120
_crt_debugger_hook
_acmdln
_initterm
__crtUnhandledException
_initterm_e
__setusermatherr
_commode
__crtTerminateProcess
__crtSetUnhandledExceptionFilter
_invoke_watson
_controlfp_s
_except_handler4_common
_calloc_crt
_purecall
??2@YAPAXI@Z
??3@YAXPAX@Z
memmove
strrchr
strstr
malloc
_CxxThrowException
__CxxFrameHandler3
memcpy
memset
strchr
??_V@YAXPAX@Z
free
_lock
_unlock
_configthreadlocale
__dllonexit
_onexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_XcptFilter
__crtGetShowWindowMode
_amsg_exit
__getmainargs
__set_app_type
exit
_exit
_cexit
_ismbblead
_fmode
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 220KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ