D:\VerifyCall\Release\VerifyCall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bd49d99bcc35b33808deab083ec5e37d445b28ca4969b9ddfbdedb20cdb51293.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bd49d99bcc35b33808deab083ec5e37d445b28ca4969b9ddfbdedb20cdb51293.exe
Resource
win10v2004-20240508-en
General
-
Target
bd49d99bcc35b33808deab083ec5e37d445b28ca4969b9ddfbdedb20cdb51293
-
Size
282KB
-
MD5
2416221e30fa4b00ab9976c4d69bb691
-
SHA1
58ff3668b9864b6520cf0a87e4fc4c0bd251632f
-
SHA256
bd49d99bcc35b33808deab083ec5e37d445b28ca4969b9ddfbdedb20cdb51293
-
SHA512
52de52bc04e96736e3d8a8baeb3409a1a5bdf960c246a4f8a390d8c89fb4795a0a2d825858c596f0d9b23f8b31211efed8ee060e8feabb2c1007d7824f19c840
-
SSDEEP
3072:HqhZJBmz4fsEvwqlP9cWXcNyN4XQPFNubW4DkYtclR771A1:8Lcz0sW9ZXc8Nd1lR7C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd49d99bcc35b33808deab083ec5e37d445b28ca4969b9ddfbdedb20cdb51293
Files
-
bd49d99bcc35b33808deab083ec5e37d445b28ca4969b9ddfbdedb20cdb51293.exe windows:6 windows x86 arch:x86
51c7c5db88284eb7fbef304862df7a6f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetDiskFreeSpaceExA
Sleep
GetEnvironmentVariableW
GetCurrentDirectoryW
FindClose
FindFirstFileW
FindNextFileW
DecodePointer
CloseHandle
RaiseException
GetLastError
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
WaitForSingleObject
GetModuleFileNameW
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
ReadFile
SetEndOfFile
WriteConsoleW
SetFilePointerEx
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
CreateEventW
GetProcAddress
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
OutputDebugStringW
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetLastError
QueryPerformanceFrequency
GetTimeZoneInformation
CreateFileW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileAttributesExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
CompareStringW
LCMapStringW
GetFullPathNameW
SetStdHandle
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetStringTypeW
FlushFileBuffers
GetConsoleCP
ReadConsoleW
user32
wsprintfW
MessageBoxW
shell32
ShellExecuteW
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ