Reader_SL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cfab44f7c0b132b4cd090c4d683b9644ad811cf8b3e79695d9377759be3c7444.exe
Resource
win7-20240215-en
General
-
Target
cfab44f7c0b132b4cd090c4d683b9644ad811cf8b3e79695d9377759be3c7444
-
Size
268KB
-
MD5
0a95df30fd2601dab1cded51c34d4c97
-
SHA1
a6e8d5ea22e197b01af6ee0361585cd137290ff1
-
SHA256
cfab44f7c0b132b4cd090c4d683b9644ad811cf8b3e79695d9377759be3c7444
-
SHA512
d8374e4ba2d0ef13c2ed5d966481d4269a28c371c33ce374e90977b87a66a0c951df20074a6560c16e777895f6a2ac864f447d331bcad32940714c0cb10a9e1d
-
SSDEEP
6144:aOdH1Xja4Li1K8CBMmXD5PcXvykZkAZ68SV2apFnygT7eLtDJ:aOh1XRZRhcdZeV2apFyg3eZF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cfab44f7c0b132b4cd090c4d683b9644ad811cf8b3e79695d9377759be3c7444
Files
-
cfab44f7c0b132b4cd090c4d683b9644ad811cf8b3e79695d9377759be3c7444.exe windows:6 windows x86 arch:x86
0d6e692aa1463f329a38a8aaa052b69b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateThread
GetCurrentThread
SetThreadPriority
TerminateThread
CreateProcessA
GetModuleFileNameA
GetModuleHandleA
GetSystemPowerStatus
FreeLibrary
GetProcAddress
LoadLibraryA
CreateFileA
CreateFileW
FindClose
FindFirstFileA
FindNextFileA
GetFileAttributesA
GetFinalPathNameByHandleW
ReadFile
CreateEventA
GetCurrentProcess
GetSystemInfo
VirtualQueryEx
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
MultiByteToWideChar
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
WideCharToMultiByte
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
WaitForSingleObject
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetFilePointer
CloseHandle
user32
LoadIconA
GetMessageA
CreateWindowExA
DestroyWindow
SetTimer
KillTimer
FindWindowA
LoadCursorA
RegisterClassExA
UnregisterClassA
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
advapi32
CloseServiceHandle
OpenServiceA
QueryServiceStatus
RegCloseKey
RegOpenKeyA
RegQueryValueA
OpenSCManagerA
shell32
SHGetKnownFolderPath
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoTaskMemFree
msvcp120
?_Syserror_map@std@@YAPBDH@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xbad_alloc@std@@YAXXZ
?_Winerror_map@std@@YAPBDH@Z
msvcr120
_crt_debugger_hook
_acmdln
_initterm
__crtUnhandledException
_initterm_e
__setusermatherr
_commode
__crtTerminateProcess
__crtSetUnhandledExceptionFilter
_invoke_watson
_controlfp_s
_except_handler4_common
_calloc_crt
_purecall
??2@YAPAXI@Z
??3@YAXPAX@Z
memmove
strrchr
strstr
malloc
_CxxThrowException
__CxxFrameHandler3
memcpy
memset
strchr
??_V@YAXPAX@Z
free
_lock
_unlock
_configthreadlocale
__dllonexit
_onexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_XcptFilter
__crtGetShowWindowMode
_amsg_exit
__getmainargs
__set_app_type
exit
_exit
_cexit
_ismbblead
_fmode
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 225KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ