E:\Private\Programming\Metahook\MetaHook_Main\Plugins\SME\Release\cssme.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c92974b0e4e77491b1f86cddff039c5dea51ef87bee2fd4be8fc64ec5905d2b3.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c92974b0e4e77491b1f86cddff039c5dea51ef87bee2fd4be8fc64ec5905d2b3.exe
Resource
win10v2004-20240508-en
General
-
Target
c92974b0e4e77491b1f86cddff039c5dea51ef87bee2fd4be8fc64ec5905d2b3
-
Size
382KB
-
MD5
bd356a284b95badebecf3e1b615270f4
-
SHA1
da13d5c4d62a4b9b519f7a1c4eb922d9f7f10c9a
-
SHA256
c92974b0e4e77491b1f86cddff039c5dea51ef87bee2fd4be8fc64ec5905d2b3
-
SHA512
5f40c8e8a3b4130b8e698f81af60fa29388d80b95596b5e362725ce1fabd9523e058d8af818877e9b9e4d850829b36955112b39fc345b69da5d12cde37e418fd
-
SSDEEP
6144:LPXRddefjqHR4YtOiq2WMceVt5J5bh7zDoPhqIYSHcJzT3Eic1zNoRFl0NStrX9T:LPXROfj2R4YtOi7tc6jJ5bhXDQhqIYS6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c92974b0e4e77491b1f86cddff039c5dea51ef87bee2fd4be8fc64ec5905d2b3
Files
-
c92974b0e4e77491b1f86cddff039c5dea51ef87bee2fd4be8fc64ec5905d2b3.exe windows:6 windows x86 arch:x86
5bbc8134ee314769245de69fa88bf71f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeleteFileA
CloseHandle
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetCurrentProcess
TerminateProcess
GetLocalTime
GetModuleHandleA
GetSystemDefaultLangID
FindClose
FindFirstFileA
FindNextFileA
GetLastError
GetCurrentThread
VirtualProtect
VirtualQuery
GetLongPathNameA
GetModuleFileNameA
GetCurrentThreadId
GetCurrentDirectoryA
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualFree
SetLastError
GetFileSize
SetFilePointer
WriteFile
CreateFileMappingW
MapViewOfFileEx
UnmapViewOfFile
GetModuleHandleW
LoadLibraryExA
LoadLibraryExW
WriteConsoleW
SetEndOfFile
SetFilePointerEx
HeapReAlloc
GetCommandLineA
LoadLibraryA
GetProcAddress
SuspendThread
FreeLibrary
HeapSize
CreateFileW
ReadConsoleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
GetACP
HeapAlloc
HeapFree
OutputDebugStringA
OutputDebugStringW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FindFirstFileExA
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetProcessHeap
SetConsoleCtrlHandler
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
DecodePointer
user32
MessageBoxA
wsprintfA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
ws2_32
WSAStartup
WSACleanup
Exports
Exports
AmdPowerXpressRequestHighPerformance
CreateInterface
F
NvOptimusEnablement
Sections
.text Size: 309KB - Virtual size: 309KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 32.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
5�ȣu� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE