D:\GEX\Programming\source\repos\EdgeWindowTabManagerBlock\Release\EdgeWindowTabManagerBlock.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5840b63853d83e5d1a2ad7c3387904894f9d0989057eb04ca86ff7247d5c2c7d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5840b63853d83e5d1a2ad7c3387904894f9d0989057eb04ca86ff7247d5c2c7d.exe
Resource
win10v2004-20240508-en
General
-
Target
5840b63853d83e5d1a2ad7c3387904894f9d0989057eb04ca86ff7247d5c2c7d
-
Size
144KB
-
MD5
65f7baf9b205ee3f61bc34f00b4f6643
-
SHA1
9ad8356d81e60dd7d5967a97b8765ab29db52a29
-
SHA256
5840b63853d83e5d1a2ad7c3387904894f9d0989057eb04ca86ff7247d5c2c7d
-
SHA512
c75bf0850de3c8c0ac9472f227200f648d6f2201938a2a1e6b7c46918313d4b610af17f65f7b64546270c2f688775c048c69ce7c7f4e3214495171a1a1dfc6d8
-
SSDEEP
3072:5eEjq5369Yz+t3QFulpt3QJIiG41/hT9TRGc3FeRy2yVi:5NqZYtAFqp9QKiGET/Ve4FVi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5840b63853d83e5d1a2ad7c3387904894f9d0989057eb04ca86ff7247d5c2c7d
Files
-
5840b63853d83e5d1a2ad7c3387904894f9d0989057eb04ca86ff7247d5c2c7d.exe windows:6 windows x86 arch:x86
552ece4a983c9e09861fc24999c21c18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Module32NextW
GetModuleFileNameA
CreateFileW
UnmapViewOfFile
Sleep
FormatMessageW
GetLastError
CreateFileA
LocalFree
CreateFileMappingW
MapViewOfFile
SetLastError
ExitProcess
ResumeThread
CreateProcessW
VirtualAllocEx
VirtualProtectEx
VirtualQueryEx
GetModuleHandleW
WriteProcessMemory
IsWow64Process
GetCurrentProcess
FreeLibrary
Module32FirstW
LoadLibraryExW
GetCurrentThreadId
DecodePointer
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
ReadProcessMemory
GetProcAddress
CloseHandle
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
OpenProcess
Thread32First
Thread32Next
SetFilePointerEx
GetProcessHeap
LCMapStringW
WriteConsoleW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
WriteFile
GetModuleFileNameW
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
user32
MessageBoxW
LoadStringW
GetAsyncKeyState
EnumThreadWindows
GetClassNameW
IsWindowVisible
comdlg32
GetOpenFileNameW
advapi32
RegOpenKeyExW
RegSetKeyValueW
RegCloseKey
RegDeleteKeyValueW
RegEnumKeyExW
RegGetValueW
dbghelp
ImageNtHeader
shlwapi
PathRemoveFileSpecA
PathUnquoteSpacesW
PathGetArgsW
PathAppendA
AssocQueryStringW
PathFileExistsW
PathFindFileNameW
AssocQueryStringByKeyW
StrCmpIW
PathRemoveBlanksW
comctl32
ord345
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ