D:\0desktop\CNC_v088_SE2_lhb_20230407\vs2010\cnc_pre_process\pos_rec\Release\pos_rec.pdb
Static task
static1
Behavioral task
behavioral1
Sample
114595c2aba2556ef92309797c404bb8312e8bbff9dbf178e210447f91528f97.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
114595c2aba2556ef92309797c404bb8312e8bbff9dbf178e210447f91528f97.exe
Resource
win10v2004-20240419-en
General
-
Target
114595c2aba2556ef92309797c404bb8312e8bbff9dbf178e210447f91528f97
-
Size
1.1MB
-
MD5
b1b079bb2d8dd4f0d6d6cd1c732355eb
-
SHA1
e847394226653ae69f53b19964db22c838dd1ac9
-
SHA256
114595c2aba2556ef92309797c404bb8312e8bbff9dbf178e210447f91528f97
-
SHA512
245b11dab18187c23f56112df8dca7efc8602c8b0a5668f0d995e815c64e061ca4603427ff0d321cd62ddeb3cb04c503905dd8a1dbb2481e977272dd260bfbdf
-
SSDEEP
24576:rYFfySh4iuTYuJ7XW3yPVnxz4CBtuYj0RYnIVpjVNL8b+CO3eOXBHaN4e/kr559J:rYruJ7XW3yPVnxz4CBtuYj0RYnIVpj3X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 114595c2aba2556ef92309797c404bb8312e8bbff9dbf178e210447f91528f97
Files
-
114595c2aba2556ef92309797c404bb8312e8bbff9dbf178e210447f91528f97.exe windows:5 windows x86 arch:x86
e1fab972a2db3b575759cd51699d3d21
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcr100
_onexit
?terminate@@YAXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_lock
_CIpow
_CIacos
_CIasin
_CIcos
_CIsin
_CIexp
memcpy
memset
__CxxFrameHandler3
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_beginthreadex
_wtoi
_wcsnicmp
strstr
isxdigit
islower
realloc
iscntrl
isupper
isdigit
isalpha
isprint
tolower
ispunct
isalnum
isspace
??2@YAPAXI@Z
??_V@YAXPAX@Z
fread
fwrite
_localtime64_s
_time64
setvbuf
__iob_func
_fdopen
_open_osfhandle
??_U@YAPAXI@Z
??3@YAXPAX@Z
clock
fclose
fopen
fscanf
fprintf
atof
atoi
sscanf
malloc
free
printf
_CIsqrt
sprintf
mfc100u
ord3482
ord1313
ord7911
ord12186
ord3174
ord1905
ord2188
ord4359
ord13181
ord3397
ord3436
ord2617
ord7901
ord3749
ord2748
ord8266
ord5809
ord921
ord3746
ord2746
ord8264
ord5802
ord917
ord1861
ord3257
ord3337
ord1310
ord1476
ord4802
ord280
ord3752
ord8270
ord5325
ord5883
ord1014
ord7241
ord290
ord7246
ord12512
ord5198
ord286
ord3380
ord5229
ord5799
ord2185
ord5846
ord970
ord2952
ord2777
ord5880
ord1011
ord6246
ord4360
ord7973
ord13047
ord12413
ord7006
ord868
ord1269
ord10969
ord13412
ord2542
ord11346
ord2068
ord2064
ord535
ord1062
ord3910
ord745
ord3260
ord3364
ord11965
ord1326
ord2939
ord2824
ord6086
ord1226
ord3369
ord5238
ord3766
ord2946
ord2847
ord8276
ord5456
ord6125
ord1274
ord4805
ord7249
ord1479
ord9149
ord9447
ord6869
ord890
ord1292
ord7176
ord1895
ord849
ord12753
ord4086
ord6140
ord9328
ord5118
ord11845
ord11209
ord11240
ord9498
ord7391
ord5900
ord11228
ord5261
ord3416
ord13568
ord13571
ord13569
ord13572
ord13567
ord13570
ord7179
ord11469
ord13267
ord10976
ord14162
ord1739
ord7126
ord11864
ord3625
ord3684
ord8530
ord13387
ord7108
ord13381
ord11477
ord11476
ord2164
ord4744
ord13854
ord11784
ord7548
ord7624
ord1934
ord7618
ord7357
ord788
ord1212
ord10081
ord8545
ord5830
ord12802
ord12155
ord882
ord1285
ord2062
ord1480
ord3373
ord6661
ord744
ord7300
ord7301
ord3491
ord11116
ord2339
ord5276
ord12557
ord10725
ord6156
ord13388
ord7109
ord13382
ord2665
ord3992
ord14067
ord3999
ord4416
ord4383
ord4379
ord4413
ord4434
ord4392
ord4421
ord4430
ord4400
ord4404
ord4408
ord4396
ord4425
ord4388
ord1519
ord1512
ord1514
ord1508
ord1501
ord11244
ord11246
ord12724
ord2853
ord8393
ord10045
ord6247
ord11210
ord8112
ord13380
ord10937
ord3402
ord11081
ord3754
ord7903
ord5855
ord11503
ord2878
ord13305
ord3361
ord3368
ord3372
ord11123
ord8179
ord10058
ord10412
ord3627
ord2981
ord2980
ord2756
ord5556
ord12606
ord2417
ord8277
ord11164
ord8372
ord8273
ord14060
ord14059
ord14132
ord14149
ord14145
ord14147
ord14148
ord14146
ord2418
ord7385
ord2884
ord8347
ord9525
ord12951
ord6713
ord3978
ord3261
ord950
ord5801
ord5862
ord3446
ord4290
ord1987
ord1450
ord948
ord1266
ord897
ord1296
ord6117
ord8346
ord9333
ord7393
ord4792
ord6922
ord6932
ord6931
ord5468
ord4623
ord4794
ord4645
ord5143
ord4901
ord8483
ord5115
ord4923
ord4642
ord11159
ord2852
ord11236
ord2951
ord2089
ord2887
ord12610
ord5558
ord2844
ord3763
ord385
ord6346
ord1312
ord902
ord296
ord2924
kernel32
GetLastError
CloseHandle
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
SetCommTimeouts
MultiByteToWideChar
GetCommState
BuildCommDCBW
SetCommState
PurgeComm
LeaveCriticalSection
CreateFileA
SetThreadPriority
ClearCommError
ReadFile
CreateFileW
InterlockedExchange
InterlockedCompareExchange
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
QueryDosDeviceW
GetVersionExW
ReleaseMutex
WaitForSingleObject
CreateMutexW
CreateThread
FreeConsole
GetStdHandle
AllocConsole
WideCharToMultiByte
WriteFile
IsProcessorFeaturePresent
Sleep
user32
SetParent
LoadBitmapW
GetClientRect
KillTimer
ShowCaret
EnableWindow
GetCursorPos
GetSubMenu
LoadMenuW
GetParent
SetTimer
SendMessageW
MessageBeep
DrawIcon
GetSystemMetrics
IsIconic
SetLayeredWindowAttributes
GetWindowLongW
SetWindowLongW
AppendMenuW
GetSystemMenu
LoadIconW
gdi32
CreateSolidBrush
comctl32
InitCommonControlsEx
skinmagic
ord2
ws2_32
recvfrom
sendto
WSAStartup
WSACleanup
htons
htonl
socket
closesocket
inet_addr
recv
send
connect
shutdown
Sections
.text Size: 513KB - Virtual size: 512KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 250KB - Virtual size: 249KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 8.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ