c:\source\source.ACL\86254\Release_wdexe_12\WX\Win32\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
124aa2e13e76efe2ff75109f144f2f4c2dbafe9c098100b4119738c9d42a7afd.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
124aa2e13e76efe2ff75109f144f2f4c2dbafe9c098100b4119738c9d42a7afd.exe
Resource
win10v2004-20240508-en
General
-
Target
124aa2e13e76efe2ff75109f144f2f4c2dbafe9c098100b4119738c9d42a7afd
-
Size
1.1MB
-
MD5
d7dad67cf79fe3c34d2a1bc03eb3e28c
-
SHA1
794880cf0bd4199d7ca883976d3c62446eba8ca9
-
SHA256
124aa2e13e76efe2ff75109f144f2f4c2dbafe9c098100b4119738c9d42a7afd
-
SHA512
734c050f376aff11d488538c70f142256cb198c26475feee90644768c3739eaaaede78f486c1807664e28eb36e512970ec788ea758f74a8e615109c6ac0877e4
-
SSDEEP
24576:KuReg5QDZPHN5S84+WkpDWq3xAF9Q3rqrcUsJX+hF7OG:TRmDZfN5S8zvWPMqwQF7OG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 124aa2e13e76efe2ff75109f144f2f4c2dbafe9c098100b4119738c9d42a7afd
Files
-
124aa2e13e76efe2ff75109f144f2f4c2dbafe9c098100b4119738c9d42a7afd.exe windows:4 windows x86 arch:x86
3d8f2f97d54fbb902659375438231cd3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
_except_handler3
_onexit
__dllonexit
_lfind
vsprintf
vswprintf
iswspace
_stricmp
memcmp
realloc
towupper
wcspbrk
_wmakepath
_wstati64
memmove
wcscmp
wcsncmp
atoi
_wcsnicmp
swprintf
_wtoi
wcsstr
_wcsupr
strchr
strlen
strcat
wcschr
_vsnprintf
_vsnwprintf
_purecall
strncmp
_wcsicmp
memcpy
gmtime
time
free
malloc
memset
??2@YAPAXI@Z
wcscpy
??3@YAXPAX@Z
wcsrchr
wcslen
wcsncpy
wcscat
__CxxFrameHandler
kernel32
WaitForSingleObject
RaiseException
CreateProcessW
CreateMailslotW
ExpandEnvironmentStringsW
GetComputerNameW
GetMailslotInfo
GetSystemDefaultLangID
GetExitCodeProcess
GetProfileStringW
CreateThread
TerminateThread
ResumeThread
InterlockedExchange
ReleaseSemaphore
CreateSemaphoreW
LoadLibraryA
GetTimeZoneInformation
WideCharToMultiByte
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetCurrentThreadId
TlsFree
TlsAlloc
VirtualProtect
VirtualQuery
TlsGetValue
TlsSetValue
GetDriveTypeW
GetFullPathNameW
FindNextFileW
FindFirstFileExW
SetFileAttributesW
GetFileAttributesW
FindClose
FindFirstFileW
CreateDirectoryW
CopyFileW
MoveFileW
DeleteFileW
Sleep
GetTickCount
CreateFileW
FileTimeToSystemTime
SystemTimeToFileTime
SetLastError
SetErrorMode
SetEndOfFile
FlushFileBuffers
UnlockFileEx
UnlockFile
LockFileEx
LockFile
SetFilePointer
ReadFile
WriteFile
GetVolumeInformationW
GetLogicalDriveStringsW
GetFileInformationByHandle
LoadLibraryW
GetVersionExW
LocalAlloc
InterlockedExchangeAdd
GetLocalTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ExitProcess
GetCommandLineW
LocalFree
GetModuleFileNameW
GetLastError
CreateFileMappingW
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
CreateEventW
GetStartupInfoW
MulDiv
SetEvent
CreateMutexW
ReleaseMutex
OpenFileMappingW
FreeLibrary
FindResourceW
LoadResource
LockResource
FreeResource
GetTempPathW
GetTempFileNameW
GetCurrentProcessId
SizeofResource
InterlockedIncrement
InterlockedDecrement
FormatMessageW
Exports
Exports
CommandeComposante
DeclareProxy
Execution
LibereMutex
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 984KB - Virtual size: 983KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ