FileTypeVerifier.pdb
Static task
static1
General
-
Target
0dbb5adacc886df878d3997c336c809290ecd003a5a094edc1cd1311c6a1b02e
-
Size
1.0MB
-
MD5
8ac9432eeaa18c2ebc8aa6ba3fae894d
-
SHA1
1aabceb90706c5e682ff4b5fad3a410781c0cb25
-
SHA256
0dbb5adacc886df878d3997c336c809290ecd003a5a094edc1cd1311c6a1b02e
-
SHA512
9a36431b75f6aad4d3d30d2e79aa712bae280ffd3c896011d43f81c558c8b774c89ac3eb7aff342b45f3c9ba3d9c1e162e3add4281874bbd9ad4a3e7ee90d3b1
-
SSDEEP
24576:CGlrU9Vg9N9JMlDlfjRiVuVsWt5MJMsg:CGEgFIDRRAubt5M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0dbb5adacc886df878d3997c336c809290ecd003a5a094edc1cd1311c6a1b02e
Files
-
0dbb5adacc886df878d3997c336c809290ecd003a5a094edc1cd1311c6a1b02e.exe windows:10 windows x64 arch:x64
8008f2b23eac3d47913a3b99d84ac902
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegGetValueW
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
RegQueryValueExW
RegEnumValueW
StartTraceW
StopTraceW
EnableTrace
OpenTraceW
ProcessTrace
CloseTrace
RegQueryValueW
RegEnumKeyW
kernel32
OpenSemaphoreW
LocalFree
CreateFileW
GetTickCount
CreateThread
CreateEventW
LockFile
WaitForSingleObject
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetTempPathW
MulDiv
CreateMutexExW
CreateSemaphoreExW
GetDateFormatW
WaitForSingleObjectEx
ReleaseMutex
ReleaseSemaphore
UnlockFile
SetEvent
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
Sleep
SetLastError
OutputDebugStringW
IsDebuggerPresent
GetThreadLocale
GetTimeFormatW
FormatMessageW
GetCurrentThreadId
GetLastError
GetProcAddress
GetModuleHandleW
HeapAlloc
GetProcessHeap
HeapFree
GetModuleHandleExW
GetModuleFileNameA
DebugBreak
CloseHandle
gdi32
GetObjectW
DeleteObject
GetDeviceCaps
user32
SetParent
SendMessageW
ReleaseDC
GetDC
DestroyWindow
DestroyMenu
GetWindowLongPtrW
SetWindowLongPtrW
CharNextW
LoadStringW
PostMessageW
GetAncestor
GetDesktopWindow
GetClientRect
CreatePopupMenu
GetMenuDefaultItem
GetMenuItemCount
GetDlgItem
SetWindowPos
CreateWindowExW
ShowWindow
MoveWindow
GetDlgCtrlID
LoadBitmapW
mfc42u
ord6886
ord1562
ord1566
ord6887
msvcrt
_vsnwprintf
wprintf
free
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBV0@@Z
memcpy_s
_vsnprintf_s
??0exception@@QEAA@XZ
memmove_s
_wfreopen
fflush
fclose
wcschr
calloc
_XcptFilter
_amsg_exit
__CxxFrameHandler3
__set_app_type
exit
_exit
_cexit
__setusermatherr
_initterm
__C_specific_handler
_wcmdln
_fmode
_commode
?terminate@@YAXXZ
??1type_info@@UEAA@XZ
_lock
_unlock
__dllonexit
_onexit
memset
_CxxThrowException
wcscmp
__iob_func
__wgetmainargs
ntdll
RtlVirtualUnwind
RtlCaptureContext
RtlLookupFunctionEntry
ole32
CoGetInterfaceAndReleaseStream
RevokeDragDrop
RegisterDragDrop
CLSIDFromString
OleUninitialize
StringFromGUID2
PropVariantClear
CoCreateInstance
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CoCreateGuid
CoMarshalInterThreadInterfaceInStream
StringFromCLSID
shlwapi
SHGetValueW
UrlEscapeW
SHStrDupW
ord219
ord176
ord158
ord615
StrStrIW
PathRemoveArgsW
PathRemoveBlanksW
PathUnquoteSpacesW
PathStripPathW
PathRemoveFileSpecW
PathRemoveBackslashW
PathFindFileNameW
AssocQueryStringW
uxtheme
SetWindowTheme
comctl32
ord388
ord324
ImageList_Create
ImageList_SetBkColor
ImageList_AddMasked
ord323
DestroyPropertySheetPage
CreatePropertySheetPageW
ord321
ord320
PropertySheetW
ord344
propsys
InitPropVariantFromInt32Vector
InitPropVariantFromUInt16Vector
InitPropVariantFromInt16Vector
InitPropVariantFromBuffer
InitPropVariantFromBooleanVector
InitPropVariantFromStringAsVector
PSGetPropertyDescription
InitPropVariantFromFileTimeVector
PSLookupPropertyHandlerCLSID
PropVariantCompareEx
PSGetNameFromPropertyKey
PSFormatForDisplay
InitPropVariantFromUInt32Vector
InitPropVariantFromFileTime
shell32
ord777
SHCreateItemFromRelativeName
SHCreateItemInKnownFolder
CommandLineToArgvW
SHCreateShellItemArrayFromDataObject
ShellExecuteExW
ord704
ord100
SHCreateItemFromParsingName
mscoree
LockClrVersion
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 341KB - Virtual size: 340KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE