C:\Users\NB\Desktop\999\999\x64\Release\999.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2c67855f3dbf0c326e7da5475e8da90944012b8e96fa276f2d64a24c85635062.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2c67855f3dbf0c326e7da5475e8da90944012b8e96fa276f2d64a24c85635062.exe
Resource
win10v2004-20240508-en
General
-
Target
2c67855f3dbf0c326e7da5475e8da90944012b8e96fa276f2d64a24c85635062
-
Size
198KB
-
MD5
c19384388e66eb4f8dbc0e4e3f616891
-
SHA1
220f3ad58e02e717aafd081174c2797ca8b486eb
-
SHA256
2c67855f3dbf0c326e7da5475e8da90944012b8e96fa276f2d64a24c85635062
-
SHA512
e5d7cc7ca0f6291598e5637957149e60d116deb7f533dd6e5fa38bb7a934a508288be0764a3999163b5c1d784cf55a557baf9dfcf900f0037ae748125afc35fa
-
SSDEEP
6144:+qoIKJozZI+D/fVaFx2sOTB18uGvO7fETyz:+joZI+D1aFQsOTn0yz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c67855f3dbf0c326e7da5475e8da90944012b8e96fa276f2d64a24c85635062
Files
-
2c67855f3dbf0c326e7da5475e8da90944012b8e96fa276f2d64a24c85635062.exe windows:5 windows x64 arch:x64
443f761946cf340b84d693b1baaab1f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
socket
WSACreateEvent
WSACloseEvent
recv
connect
bind
WSACleanup
WSAEventSelect
WSAResetEvent
WSAStartup
freeaddrinfo
getsockname
inet_ntoa
WSASetLastError
WSAStringToAddressW
shutdown
closesocket
send
gethostname
gethostbyname
getaddrinfo
getpeername
setsockopt
WSAIoctl
InetNtopW
htons
ntohs
WSAGetLastError
kernel32
LocalFree
EncodePointer
DecodePointer
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
MultiByteToWideChar
lstrlenA
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
lstrcatW
GetModuleHandleW
GetLocalTime
CloseHandle
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CreateFileW
GetProcAddress
LoadLibraryW
GetTickCount
lstrcpyW
GetCurrentProcess
GlobalMemoryStatusEx
GetDiskFreeSpaceExW
GetDriveTypeW
GetSystemInfo
lstrcmpW
lstrlenW
FreeLibrary
ExitProcess
CreateProcessW
GetStartupInfoW
GetCommandLineW
GetModuleFileNameW
WideCharToMultiByte
Sleep
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
OpenProcess
GetCurrentProcessId
GetSystemDirectoryW
GetLocaleInfoW
GetFileSize
WaitForSingleObject
WriteFile
CopyFileW
ExpandEnvironmentStringsW
CreateEventA
SetEvent
FormatMessageW
SetLastError
VirtualProtect
IsBadReadPtr
LoadLibraryA
GetNativeSystemInfo
ResetEvent
QueryPerformanceCounter
CreateEventW
QueryPerformanceFrequency
SetUnhandledExceptionFilter
SetErrorMode
CreateThread
GetCurrentThreadId
MoveFileExA
GetModuleFileNameA
GetCurrentDirectoryA
InitializeCriticalSectionAndSpinCount
HeapCreate
HeapDestroy
MapViewOfFileEx
CreateFileMappingW
SwitchToThread
UnmapViewOfFile
user32
PostThreadMessageA
OpenWindowStationW
SetProcessWindowStation
FindWindowA
GetWindowTextA
GetWindow
GetClassNameA
SendMessageW
EnumDisplayMonitors
GetMonitorInfoW
GetLastInputInfo
wsprintfW
GetForegroundWindow
GetWindowTextW
DispatchMessageW
TranslateMessage
PeekMessageW
MsgWaitForMultipleObjects
GetInputState
advapi32
FreeSid
RegDeleteValueW
RegCreateKeyW
CheckTokenMembership
AllocateAndInitializeSid
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExA
RegQueryInfoKeyW
GetCurrentHwProfileW
RegSetValueExW
RegOpenKeyExA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
SysStringLen
SysAllocString
VariantInit
SysFreeString
VariantClear
shlwapi
StrChrW
msvcp100
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
msvcr100
_lock
_onexit
_amsg_exit
__wgetmainargs
_XcptFilter
_exit
_cexit
exit
rand
_wcsrev
_wtoi
_time64
memcmp
_purecall
qsort
bsearch
realloc
_beginthreadex
wcsncpy_s
wcsncat_s
wcsrchr
wcschr
??0exception@std@@QEAA@AEBV01@@Z
strcat_s
__winitenv
_initterm
__dllonexit
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
__crt_debugger_hook
srand
sprintf
printf
??0exception@std@@QEAA@AEBQEBDH@Z
swscanf_s
_recalloc
strcpy_s
_itow_s
wcscpy_s
swprintf_s
memset
??1exception@std@@UEAA@XZ
?what@exception@std@@UEBAPEBDXZ
??0exception@std@@QEAA@AEBQEBD@Z
wcsstr
memmove
memcpy
ceil
_unlock
__C_specific_handler
memcpy_s
_initterm_e
calloc
??3@YAXPEAX@Z
malloc
free
_CxxThrowException
??2@YAPEAX_K@Z
??_V@YAXPEAX@Z
_resetstkoflw
__CxxFrameHandler3
winmm
timeGetDevCaps
timeBeginPeriod
timeGetTime
timeEndPeriod
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ