E:\cpp\out\out\out.pdb
Static task
static1
Behavioral task
behavioral1
Sample
462bbb8fd7be98129aa73efa91e2d88fa9cafc7b47431b8227d1957f5d0c8ba7.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
462bbb8fd7be98129aa73efa91e2d88fa9cafc7b47431b8227d1957f5d0c8ba7.exe
Resource
win10-20240404-en
General
-
Target
462bbb8fd7be98129aa73efa91e2d88fa9cafc7b47431b8227d1957f5d0c8ba7
-
Size
1018KB
-
MD5
d50a3b60eb046c5d7bc6768bd3d7f1b9
-
SHA1
7a33162908cba6678dc75d688da1f86b54849782
-
SHA256
462bbb8fd7be98129aa73efa91e2d88fa9cafc7b47431b8227d1957f5d0c8ba7
-
SHA512
0ff59614c5f1e118f02c5b895ffc574bee59fbec5a2b859dd970173765420ae16bb4db06ce8159dabca6304f5ced0a1e75afde15720eba3f3510e5f47fa14897
-
SSDEEP
24576:FNmcuJVxZ02owfnvUo7cvx1Swcs/mpVs/DtnGgFg9voR:yDljHZsnHx/GctvFx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 462bbb8fd7be98129aa73efa91e2d88fa9cafc7b47431b8227d1957f5d0c8ba7
Files
-
462bbb8fd7be98129aa73efa91e2d88fa9cafc7b47431b8227d1957f5d0c8ba7.exe windows:6 windows x86 arch:x86
abf6fdfb7bf0bac3cdf1d57f1636f30a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameA
CompareFileTime
GetFullPathNameW
GetCurrentProcess
lstrlenW
GetStdHandle
ExpandEnvironmentStringsW
GetConsoleCP
SetEnvironmentVariableW
LeaveCriticalSection
lstrlenA
LocalAlloc
CreateFileW
GetFileAttributesW
GetCurrentThreadId
lstrcmpA
GetCurrentDirectoryA
GetModuleHandleA
GetCommandLineA
GetFileAttributesA
CreateFileA
GetCurrentThread
TlsAlloc
FindResourceExW
GetWindowsDirectoryA
LoadResource
CreateDirectoryA
SetFileAttributesA
GetLocalTime
SetStdHandle
WriteConsoleW
ReadProcessMemory
GetCurrentProcessId
GetModuleHandleW
TlsGetValue
TlsFree
CreateFileMappingW
QueryPerformanceCounter
GetTickCount
SetUnhandledExceptionFilter
CloseHandle
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetStringTypeW
GetTickCount64
GetSystemDirectoryA
VirtualAlloc
ExitProcess
FindResourceW
Sleep
GetFileType
DecodePointer
GetProcessHeap
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RtlUnwind
RaiseException
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsSetValue
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameW
WriteFile
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
user32
PostQuitMessage
CharUpperW
GetDC
GetSystemMetrics
MessageBoxA
GetSysColor
CloseWindow
DestroyWindow
DefWindowProcA
SendMessageA
CreateDialogParamA
gdi32
CreateSolidBrush
advapi32
RegCloseKey
RegOpenKeyA
RegEnumKeyA
ole32
OleInitialize
shlwapi
PathFindOnPathA
PathFileExistsW
PathFindSuffixArrayA
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dallas Size: 139KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 264B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 718KB - Virtual size: 717KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.corban Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ