t:\clview\x86\ship\0\clview.pdb
Static task
static1
Behavioral task
behavioral1
Sample
467bc759894f6053b409e39e3721be024a3c1146baf72f7c6950e74472199359.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
467bc759894f6053b409e39e3721be024a3c1146baf72f7c6950e74472199359.exe
Resource
win10v2004-20240226-en
General
-
Target
467bc759894f6053b409e39e3721be024a3c1146baf72f7c6950e74472199359.exe
-
Size
759KB
-
MD5
197cce732a263fd18326312c4bfd90b0
-
SHA1
2e3e3e6b088cc774679b3d8dd9936c1aa50df4ce
-
SHA256
467bc759894f6053b409e39e3721be024a3c1146baf72f7c6950e74472199359
-
SHA512
5fd901da64481e09b389c43d13d41f32399f7ea7d896e9430d4b2895552bf1e2134baa94ccde08862bcabe3e1e83004d09db0ed9648cb569919ceecfb1cf7e9d
-
SSDEEP
12288:P0H4KiIQ2slzPMTmkJR4Do07Y86gw5CtCjX+NLuFhNpBeZT3X:8YKiIClQSkQ/7Gb8NLEbeZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 467bc759894f6053b409e39e3721be024a3c1146baf72f7c6950e74472199359.exe
Files
-
467bc759894f6053b409e39e3721be024a3c1146baf72f7c6950e74472199359.exe.exe windows:4 windows x86 arch:x86
b525b133652cd0240e3f916da9fb0c1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
CreateSolidBrush
DeleteObject
kernel32
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
SetLastError
MulDiv
GetCommandLineW
FreeLibrary
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
GetLastError
lstrcmpiW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
DeleteFileW
MoveFileExW
CloseHandle
WriteFile
ReadFile
GetFileSize
GlobalUnlock
GlobalLock
GlobalAlloc
GetUserDefaultLCID
lstrlenA
GetTempFileNameW
GetTempPathW
CreateThread
FindClose
FindFirstFileW
GetLongPathNameW
WaitForSingleObject
ReleaseMutex
CreateMutexW
WideCharToMultiByte
CreateProcessW
ProcessIdToSessionId
GetCurrentProcessId
LocalAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
LoadLibraryW
GetTempPathA
GetTempFileNameA
CreateProcessA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
VirtualProtect
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcAddress
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
Sleep
TlsGetValue
user32
GetMenuStringW
GetCursorPos
FrameRect
AdjustWindowRect
InflateRect
ModifyMenuW
FindWindowExW
GetClassNameW
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CreatePopupMenu
MessageBeep
AppendMenuW
KillTimer
TrackPopupMenu
CharNextW
GetKeyState
SetWindowLongW
GetWindowLongW
CallWindowProcW
SendMessageW
GetClientRect
ShowWindow
GetClassInfoExW
LoadCursorW
DefWindowProcW
SetTimer
MapVirtualKeyW
DestroyIcon
GetWindowPlacement
SetWindowPlacement
SetWindowTextW
MessageBoxW
PostMessageW
GetSystemMetrics
GetTopWindow
GetForegroundWindow
BringWindowToTop
GetWindow
EnumWindows
SendMessageTimeoutW
GetParent
MonitorFromWindow
GetMonitorInfoW
SetWindowPos
SystemParametersInfoW
IsWindowVisible
GetWindowRect
LoadIconW
MapWindowPoints
CopyRect
DestroyWindow
CreateWindowExW
RegisterClassExW
UnregisterClassA
msocf
?CreateTheApp@Frame@MsoCF@@YGXAAUCreateTheAppArgs@12@@Z
?TheApp@Frame@MsoCF@@YGPAUAFrameApp@2@XZ
?TerminateTheApp@Frame@MsoCF@@YGXXZ
?Finish@Frame@MsoCF@@YGXXZ
?Finish@Utilities@MsoCF@@YGXXZ
??0CToolbarData@MsoCF@@QAE@XZ
?Init@CToolbarData@MsoCF@@QAGXPBUStaticToolbarDesc@2@IPBUStaticMenuDesc@2@I@Z
?g_FixedBufferAllocator@MsoCF@@3VCFixedBufferAllocator@1@A
?SetWzFromNumber@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@IHHPAH@Z
?g_FastBufferAllocator@MsoCF@@3VCFastBufferAllocator@1@A
?AppendArrayOfCharactersToWz@Strings@MsoCF@@YGXPB_WHAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAH@Z
?SetWzFromResource@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAUHINSTANCE__@@IPAH@Z
?CreateActionManager@MsoCF@@YGXPAPAUIActionManager@1@@Z
??1CToolbarData@MsoCF@@QAE@XZ
?Start@Utilities@MsoCF@@YGXHPAU_msotcfcf@@@Z
?Start@Frame@MsoCF@@YGXXZ
?SetWtzFromPattern@Strings@MsoCF@@YGXAAV?$CWtzInBuffer_Template@V?$CBuffer@_W@MsoCF@@@2@PAUHINSTANCE__@@IQAPB_WH@Z
?SetWzFromPattern@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAUHINSTANCE__@@IQAPB_WHPAH@Z
?Free@Allocator@Memory@MsoCF@@YGXPAX@Z
?TheActionManager@MsoCF@@YGPAUIActionManager@1@XZ
?Set@Properties@MsoCF@@YGXPAUIPropertySet@2@ABUPropertyInfo@2@PBXW4PropertyType@2@@Z
?LookupProperty@MsoCF@@YGABUPropertyInfo@1@I@Z
?FGet@Properties@MsoCF@@YG_NPAUIPropertySet@2@PBUPropertyInfo@2@PAXHW4PropertyType@2@@Z
?FreeAndZero_ComplexType@CPropertyData@MsoCF@@SGXPAXW4PropertyType@2@@Z
?ProduceAtom@MsoCF@@YGXPAPAVIAtom@1@PBXH@Z
?GetProperty@IPropertySet@MsoCF@@QAGXABUPropertyInfo@2@PAVCPropertyValue@2@@Z
?RegisterPropertySpace@MsoCF@@YGXPBUPropertySpaceInfo@1@@Z
msvcr80
_onexit
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
_crt_debugger_hook
_except_handler4_common
_decode_pointer
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
??3@YAXPAX@Z
??_V@YAXPAX@Z
__CxxFrameHandler3
_CxxThrowException
??_U@YAPAXI@Z
swprintf_s
memset
_recalloc
??2@YAPAXI@Z
malloc
free
memcpy_s
wcsncpy_s
_vsnprintf
_vsnwprintf
memcpy
_wtoi
_wcsdup
_wtol
vswprintf_s
wcsrchr
wcscpy_s
vsprintf_s
fclose
fwprintf_s
fopen_s
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
oleaut32
VariantInit
SysFreeString
VarUI4FromStr
SysAllocString
VariantClear
shlwapi
PathCreateFromUrlW
AssocQueryStringW
shell32
CommandLineToArgvW
SHFileOperationW
wininet
InternetErrorDlg
HttpQueryInfoW
InternetOpenW
InternetReadFile
InternetCloseHandle
InternetOpenUrlW
urlmon
URLDownloadToFileW
ObtainUserAgentString
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE