D:\dbs\sh\ddvsm\0128_230433\cmd\4o\out\binaries\x86ret\bin\i386\VsRegEdit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a38abae7b42daa2def2e26ae43bc1e2bd11be32a48ac41abd7c47ea930089ca6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a38abae7b42daa2def2e26ae43bc1e2bd11be32a48ac41abd7c47ea930089ca6.exe
Resource
win10v2004-20240419-en
General
-
Target
a38abae7b42daa2def2e26ae43bc1e2bd11be32a48ac41abd7c47ea930089ca6
-
Size
1.6MB
-
MD5
173000c29e76c5df95f0ffda6e0cfc4a
-
SHA1
699a313a060e57d9a4fcb2c9256d3333de6f8b80
-
SHA256
a38abae7b42daa2def2e26ae43bc1e2bd11be32a48ac41abd7c47ea930089ca6
-
SHA512
d7d3571ef943dcb907969d0d9013108bcc83bc65f9fa28c47457591cad0be2977f49ea80f351aca3766ae2bdeb1be7cc6deaf6defd2c11ec39ff0fe2ad01a0a0
-
SSDEEP
12288:UmcpdSiWGPCcjuPsyjCKTKoH/uLJOyo937vGFWxwFJI+yeuVb8r+ZP712Ii+51ce:+nWc9cPJ2JOt934J7Z6bQaj1BvUm9J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a38abae7b42daa2def2e26ae43bc1e2bd11be32a48ac41abd7c47ea930089ca6
Files
-
a38abae7b42daa2def2e26ae43bc1e2bd11be32a48ac41abd7c47ea930089ca6.exe windows:6 windows x86 arch:x86
c76d36aa350b124608209cd41a5973e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCloseKey
CheckTokenMembership
AllocateAndInitializeSid
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegDeleteTreeA
RegDeleteKeyValueW
RegDeleteKeyValueA
RegDeleteValueA
RegDeleteKeyExW
RegDeleteKeyExA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegLoadAppKeyW
RegDeleteTreeW
RegSaveKeyW
RegGetKeySecurity
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RevertToSelf
ImpersonateLoggedOnUser
FreeSid
kernel32
VirtualFree
VirtualAlloc
FlushInstructionCache
SetThreadContext
GetThreadContext
ResumeThread
SuspendThread
VirtualQuery
FindResourceW
LoadResource
FindResourceExW
LockResource
FindClose
FindFirstFileW
SizeofResource
GetModuleHandleW
GetProcessHeap
DeleteCriticalSection
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionEx
GetModuleFileNameW
HeapFree
VirtualProtect
CreateDirectoryW
GetFileAttributesW
MoveFileW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwind
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
CompareStringW
LCMapStringW
GetFileType
GetStringTypeW
GetCurrentThread
OutputDebugStringW
CloseHandle
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
CreateFileW
CreateMutexW
ReleaseMutex
WaitForSingleObject
LoadLibraryW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
GetTickCount
Sleep
GetFileAttributesExW
GetPrivateProfileStringW
VerSetConditionMask
VerifyVersionInfoW
CompareStringA
InitializeCriticalSection
CreateToolhelp32Snapshot
Thread32First
OpenThread
Thread32Next
HeapUnlock
GetVersionExW
HeapLock
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryEnterCriticalSection
shell32
SHGetFolderPathW
ole32
StringFromGUID2
CoTaskMemFree
CLSIDFromString
CoCreateGuid
StringFromCLSID
oleaut32
SysFreeString
SysAllocString
shlwapi
PathRemoveBackslashW
PathIsRootW
PathCombineW
PathRemoveFileSpecW
StrCmpIW
PathFileExistsW
PathAppendW
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE