e:\work2012\code\code_win\run\skgcfg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f2e722ef48254d42bc6b4d92bc10f6954db22016beb56aaa251e67a8eb95b5f6.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f2e722ef48254d42bc6b4d92bc10f6954db22016beb56aaa251e67a8eb95b5f6.exe
Resource
win10v2004-20240508-en
General
-
Target
f2e722ef48254d42bc6b4d92bc10f6954db22016beb56aaa251e67a8eb95b5f6
-
Size
336KB
-
MD5
2c8a408d65abe31a236996a01d3732a1
-
SHA1
e91decd73abed92a3cbd643bcbce37660a61b1e9
-
SHA256
f2e722ef48254d42bc6b4d92bc10f6954db22016beb56aaa251e67a8eb95b5f6
-
SHA512
c1e0c7dedc5cb2fa1a5c9f7782c8f9cc15c0f24e37e8a7d31c62d45732fb81236cdf2ee1841ec93385038c81986b73047c410cd01a9dc12e2095ac11a45500cf
-
SSDEEP
6144:KRVPu8y9Ef7ZUJa/vYMurFt4ZtOh54kZlKRXu:KRAt9QOourF+ZKZlf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f2e722ef48254d42bc6b4d92bc10f6954db22016beb56aaa251e67a8eb95b5f6
Files
-
f2e722ef48254d42bc6b4d92bc10f6954db22016beb56aaa251e67a8eb95b5f6.exe windows:5 windows x86 arch:x86
a19b6d9a45ae797c1a956d4bac3f8936
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ssleay32
ord87
ord75
ord8
ord48
ord96
ord90
ord110
ord12
ord74
ord183
ord108
ord58
ord43
ord78
objloader
?ComMgrUninit@@YAJXZ
?ComRegSvr@@YAJPB_WABU_GUID@@@Z
?ComGetModuleHandle@@YAJU_GUID@@PAPAUHINSTANCE__@@@Z
?ComMgrInit@@YAJXZ
?ComCreateInst@@YAJABU_GUID@@PAUIUnknown@@K0PAPAX@Z
?ComUnregSvr@@YAJABU_GUID@@@Z
mfc90u
ord2038
ord2360
ord2048
ord6065
ord5979
ord4405
ord285
ord3220
ord1607
ord811
ord938
ord5182
ord744
ord524
ord2597
ord4442
ord2596
ord6579
ord6604
ord1108
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord2251
ord2206
ord6035
ord4179
ord1048
ord5548
ord6741
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord4347
ord4996
ord5680
ord5663
ord6018
ord3115
ord4905
ord3670
ord2447
ord6482
ord1098
ord4211
ord1137
ord799
ord794
ord589
ord4043
ord4967
ord3145
ord4543
ord2069
ord6347
ord6355
ord4266
ord2537
ord296
ord4262
ord693
ord3563
ord3252
ord4658
ord2280
ord1183
ord6311
ord6760
ord1934
ord1937
ord5008
ord4000
ord2057
ord600
ord286
ord639
ord374
ord3794
ord5632
ord5324
ord2208
ord265
ord1809
ord1675
ord3353
ord6408
ord1492
ord4664
ord5653
ord4682
ord5167
ord4631
ord1938
ord6577
ord1354
ord778
ord595
ord797
ord3654
ord4681
ord4910
ord266
ord4044
ord3676
ord6636
ord3674
ord3933
ord436
ord686
ord1353
ord636
ord367
ord1688
ord3486
ord3537
ord692
ord4657
ord1695
ord4511
ord1602
ord2105
ord6791
ord1488
ord3841
ord654
ord3807
ord4741
ord1807
ord5592
ord2084
ord6022
ord3741
ord1764
ord1149
ord1261
ord320
ord4398
ord1144
ord1262
ord5635
ord6187
ord4774
ord6746
ord4130
ord615
ord4654
ord1667
ord4510
ord1601
ord2103
ord3775
ord2901
ord4348
ord2891
ord4071
ord4081
ord4080
ord3286
ord2764
ord2893
ord2774
ord3140
ord2966
ord4728
ord3112
ord2983
ord2771
ord5650
ord1727
ord1791
ord1792
ord2139
ord5625
ord1442
ord3226
ord6376
ord5404
ord3682
ord6804
ord4174
ord6802
ord1641
ord2368
ord2375
ord2630
ord2612
ord2610
ord2628
ord2640
ord2617
ord2633
ord2638
ord2621
ord2623
ord2625
ord2619
ord2635
ord2615
ord971
ord967
ord969
ord965
ord960
ord5683
ord5685
ord6466
ord801
ord813
ord1728
ord4702
ord5154
ord3743
ord5664
ord4603
ord6800
ord5512
ord2074
ord5602
ord4660
ord1493
ord4345
ord1751
ord1754
ord6411
ord3355
ord1719
ord5322
ord3543
ord2106
ord3637
ord4131
ord611
ord4652
ord1665
ord2274
ord3768
ord2593
ord1063
ord1248
ord1810
ord1088
ord1272
ord2283
ord2143
msvcr90
_purecall
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
strrchr
_localtime64_s
_time64
strcat_s
memset
__CxxFrameHandler3
memcpy
atoi
strstr
_waccess
wcsncpy_s
wcsstr
sprintf_s
strcpy_s
?what@exception@std@@UBEPBDXZ
_invalid_parameter_noinfo
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
memmove_s
wcscat_s
_wcsicmp
rand
exit
_wcsdup
srand
swprintf_s
_CxxThrowException
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
wcscpy_s
kernel32
SetLastError
LoadLibraryW
GetModuleHandleW
GetProcAddress
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CreateEventW
FindResourceW
LoadResource
LockResource
GlobalAlloc
TerminateThread
CreateThread
CreateFileA
GetCurrentDirectoryW
CreateDirectoryW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetCurrentProcess
GetModuleFileNameW
ReadFile
WriteFile
SetFilePointer
GetLastError
GetLocalTime
GetComputerNameA
SetFileAttributesW
GetDiskFreeSpaceExW
Sleep
GlobalUnlock
MoveFileW
WaitForSingleObject
FindNextFileW
DeleteFileW
GetFileSize
CreateFileW
FindFirstFileW
CloseHandle
SetEvent
OpenEventW
GetTickCount
MultiByteToWideChar
GetCurrentThreadId
OpenProcess
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
GlobalFree
GlobalLock
WideCharToMultiByte
user32
IsWindow
GetClientRect
SendMessageW
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetForegroundWindow
SetWindowPos
LoadIconW
GetLastInputInfo
GetSystemMenu
AppendMenuW
SetTimer
IsIconic
GetSystemMetrics
DrawIcon
SetWindowRgn
SetActiveWindow
GetActiveWindow
IsWindowEnabled
GetDesktopWindow
ReleaseDC
GetWindowDC
DrawTextW
FillRect
UpdateWindow
SetCursor
SetClassLongW
GetClassLongW
GetDlgCtrlID
GetParent
PostMessageW
EnableWindow
RegisterClassW
LoadCursorW
DefWindowProcW
GetWindowLongW
UnregisterClassW
SetWindowLongW
CreateWindowExW
ScreenToClient
ShowWindow
SetWindowTextW
SetFocus
EndDialog
GetDlgItem
GetWindowTextW
InvalidateRect
FindWindowW
KillTimer
IsWindowVisible
GetWindowRect
gdi32
CombineRgn
GetBitmapBits
CreateBitmap
CreateRectRgn
StretchBlt
DeleteDC
BitBlt
GetObjectW
SetPixel
CreateFontW
SetBkColor
LineTo
MoveToEx
SetTextColor
SetBkMode
Rectangle
SelectObject
CreatePen
GetStockObject
CreateSolidBrush
CreateCompatibleDC
DeleteObject
advapi32
RevertToSelf
RegCreateKeyW
CreateProcessAsUserW
OpenProcessToken
RegOpenKeyExW
ImpersonateLoggedOnUser
RegQueryValueExW
RegSetValueExW
RegCloseKey
shell32
SHGetPathFromIDListW
SHGetFolderPathW
ShellExecuteW
SHBrowseForFolderW
SHGetMalloc
comctl32
_TrackMouseEvent
InitCommonControlsEx
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
psapi
GetModuleInformation
GetModuleBaseNameW
ws2_32
WSAStartup
WSACleanup
select
__WSAFDIsSet
recv
send
gethostname
socket
gethostbyname
htons
ioctlsocket
connect
WSAGetLastError
closesocket
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ