JSConstraintDebug.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae87757280efaf4406402d63cc09b61de12ee0652f41a03a9ea3a6b9e64c4d27.exe
Resource
win10v2004-20240426-en
General
-
Target
ae87757280efaf4406402d63cc09b61de12ee0652f41a03a9ea3a6b9e64c4d27
-
Size
613KB
-
MD5
dd6ebb8ddd7ed5d770019aad124dcd50
-
SHA1
0a38dde89de7f6921a86df7fefc1047f558c5a9c
-
SHA256
ae87757280efaf4406402d63cc09b61de12ee0652f41a03a9ea3a6b9e64c4d27
-
SHA512
3b19b02ddee271f11b6a43c5a9410c6708ea240e96f0cbeb14eeb947cf7278ab2868d11fae58834a09eded33ce14e5327c7ae4be321637c13489f1049bdca90d
-
SSDEEP
12288:qO8XqZiMwQJXx6a/YvRcFKBsX9Da2XbJda3Q93i8OPowY79pk/DCWN:qO8aZiUJXca/VQBIe2dhi8OP3YGv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae87757280efaf4406402d63cc09b61de12ee0652f41a03a9ea3a6b9e64c4d27
Files
-
ae87757280efaf4406402d63cc09b61de12ee0652f41a03a9ea3a6b9e64c4d27.exe windows:10 windows x64 arch:x64
92ff1a2ee96a9db398bb15f6ff6228a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
OpenProcessToken
GetTokenInformation
RegQueryInfoKeyW
RegEnumValueW
RegGetValueW
kernel32
WaitForSingleObject
CreateProcessW
CopyFileExW
WideCharToMultiByte
VerifyVersionInfoW
VerSetConditionMask
GetPrivateProfileStringW
GetFileAttributesW
GetPrivateProfileSectionW
CloseHandle
FreeLibrary
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
TerminateProcess
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
Sleep
GetLastError
GetCurrentProcess
msvcrt
memmove
memcpy
??1type_info@@UEAA@XZ
?terminate@@YAXXZ
_commode
_fmode
__C_specific_handler
_initterm
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
_XcptFilter
_callnewh
??0exception@@QEAA@AEBQEBDH@Z
malloc
_CxxThrowException
tolower
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBD@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
printf
__CxxFrameHandler3
??3@YAXPEAX@Z
wcstok_s
wcsstr
_vsnwprintf
_wcsicmp
iswspace
_purecall
wcsrchr
memset
oleaut32
SysFreeString
prntvpt
ord6
ord2
ord10
ord9
ord8
ord7
shlwapi
SHCreateStreamOnFileW
ord12
winspool.drv
OpenPrinterW
ClosePrinter
GetPrinterW
GetPrinterDriverW
GetPrinterDriverDirectoryW
GetPrinterDataW
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE