D:\Source\btop4win\x64\Release-LHM\btop4win.pdb
Static task
static1
Behavioral task
behavioral1
Sample
btop4win.exe
Resource
win11-20240419-en
General
-
Target
btop4win.exe
-
Size
2.5MB
-
MD5
2d4250ca21a04147b39b200bb05a3058
-
SHA1
20961ccaaab8f6c14b921ff662d19bb534590bd6
-
SHA256
6acb0f05ec36fc8b708e8c45faaccebfa2e070f107f41deb59c6b3d6b51627e8
-
SHA512
fd0889d178b4d76c4d582f9d0163daaec8c76123dcbdf823661f592564e19e1bdeed212e523f9df2e5de7c5f2ac5108d0b078f2e452796f1ceb7df422b0d108e
-
SSDEEP
24576:+Ue3NzyzeEK3+jXs4aCv9Uwxa6pNcMJ8taUoqsh/2oU+sTx1eZs6PhX7U6cvSKIH:+Ul24aCVUwif75T/As6PhLHcO0RWx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource btop4win.exe
Files
-
btop4win.exe.exe windows:6 windows x64 arch:x64
87a1834a4ef36bbdb8c3392776932818
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
psapi
GetProcessMemoryInfo
GetPerformanceInfo
kernel32
Process32NextW
Process32FirstW
HeapReAlloc
GetSystemInfo
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
SystemTimeToFileTime
GlobalMemoryStatusEx
WideCharToMultiByte
GetSystemTimeAsFileTime
GetDiskFreeSpaceExA
GetProcessTimes
GetStdHandle
ReadConsoleInputW
GetNumberOfConsoleInputEvents
TerminateProcess
ReadFile
GetConsoleScreenBufferInfo
SetConsoleMode
CreatePipe
WaitForSingleObject
LocalAlloc
GetConsoleMode
GlobalAlloc
GlobalFree
CreateToolhelp32Snapshot
LocalFree
CreateProcessW
SetConsoleOutputCP
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapSize
GetLastError
CreateFileW
GetVolumeInformationA
InitializeCriticalSectionEx
GetSystemPowerStatus
GetSystemTimes
GetDriveTypeA
DeviceIoControl
RegisterWaitForSingleObject
GetCurrentProcess
HeapFree
GetLogicalDrives
GetModuleFileNameW
SetConsoleTitleA
SetConsoleCtrlHandler
SetStdHandle
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
ReadConsoleW
GetConsoleOutputCP
FlushFileBuffers
GetFileSizeEx
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetCurrentThread
GetCommandLineW
GetCommandLineA
WriteFile
GetTickCount64
OpenProcess
CreateEventW
FreeLibraryAndExitThread
ResumeThread
WriteConsoleW
CloseHandle
SetFileAttributesW
FormatMessageA
GetLocaleInfoEx
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
GetFullPathNameW
SetEndOfFile
RtlUnwind
SetFileInformationByHandle
SetFilePointerEx
SetFileTime
GetTempPathW
AreFileApisANSI
CreateDirectoryExW
CopyFileW
MoveFileExW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
MultiByteToWideChar
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
IsProcessorFeaturePresent
GetModuleHandleW
GetProcAddress
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThreadId
WaitForSingleObjectEx
Sleep
SwitchToThread
GetExitCodeThread
GetNativeSystemInfo
InitializeSRWLock
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
LCMapStringEx
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitOnceExecuteOnce
InitializeConditionVariable
WakeConditionVariable
SleepConditionVariableCS
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
EncodePointer
CompareStringEx
GetCPInfo
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
OutputDebugStringW
RaiseException
RtlUnwindEx
RtlPcToFileHeader
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
user32
UnregisterClassW
advapi32
QueryServiceStatusEx
RegQueryValueExW
LookupAccountSidW
CloseServiceHandle
OpenSCManagerW
ControlService
StartServiceW
ChangeServiceConfigW
OpenServiceW
GetTokenInformation
LookupPrivilegeValueW
AdjustTokenPrivileges
RevertToSelf
ImpersonateSelf
OpenProcessToken
RegOpenKeyExW
ole32
CoSetProxyBlanket
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
oleaut32
CreateErrorInfo
SetErrorInfo
VariantChangeType
VariantInit
GetErrorInfo
SysFreeString
VariantClear
SysAllocString
ntdll
NtQuerySystemInformation
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
pdh
PdhOpenQueryW
PdhCollectQueryDataEx
PdhAddEnglishCounterW
PdhGetFormattedCounterValue
ws2_32
inet_ntop
iphlpapi
GetIfEntry2
GetAdaptersAddresses
powrprof
CallNtPowerInformation
cppdll
?FetchLHMReport@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@XZ
?FetchLHMValues@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@XZ
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 383KB - Virtual size: 382KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ