F:\jenkins\workspace\cstsas_console_7.4.1\cstsa_wpf_console\tool\TSALuncherx64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fdd3b0b7edf02957cc96bb840f47a612bf6a5870848abd3060ec8be64cf7868b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fdd3b0b7edf02957cc96bb840f47a612bf6a5870848abd3060ec8be64cf7868b.exe
Resource
win10v2004-20240419-en
General
-
Target
fdd3b0b7edf02957cc96bb840f47a612bf6a5870848abd3060ec8be64cf7868b
-
Size
339KB
-
MD5
d9ddcc20e6dbf81685d91e3d70128357
-
SHA1
dabd5ce0eea60beda69ed839735c14749d3f21e5
-
SHA256
fdd3b0b7edf02957cc96bb840f47a612bf6a5870848abd3060ec8be64cf7868b
-
SHA512
c1ce3a9190023c7e249f1a6dc3568222a18439d72865aa5011ae7de6875b78275aaad39deef3d811299094381dc3480ed1d28e6f62afc0bdfafcb024334d755b
-
SSDEEP
6144:LBfUXM8HtGd+QZrDAjDEwHQGeZrDAjDEwHQGkZrDAjDEwHQGDkFg:Nfmv4zkXZskXZikXZY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fdd3b0b7edf02957cc96bb840f47a612bf6a5870848abd3060ec8be64cf7868b
Files
-
fdd3b0b7edf02957cc96bb840f47a612bf6a5870848abd3060ec8be64cf7868b.exe windows:6 windows x64 arch:x64
54fe3a66db955ccf41cdfd3ea80d48df
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
FindResourceW
LoadResource
SizeofResource
LockResource
GetProcAddress
FreeResource
CreateFileW
WriteConsoleW
SetFilePointerEx
LoadLibraryW
SetDllDirectoryW
GetWindowsDirectoryW
GetConsoleMode
GetConsoleCP
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RaiseException
RtlUnwindEx
GetLastError
GetModuleFileNameW
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetACP
HeapFree
HeapAlloc
GetStringTypeW
LCMapStringW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetFileType
GetCommandLineA
GetCommandLineW
CloseHandle
FindClose
FindFirstFileExW
FindNextFileW
SetStdHandle
HeapSize
HeapReAlloc
FlushFileBuffers
GetSystemDirectoryW
user32
wsprintfW
MessageBoxW
advapi32
SystemFunction036
RegQueryValueExW
RegOpenKeyW
shlwapi
PathAppendW
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 231KB - Virtual size: 231KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ