c:\users\ismai\downlo~1\interc~1\samples\x2y\objfre_wxp_x86\i386\x2y.pdb
Static task
static1
Behavioral task
behavioral1
Sample
439b3a0d7affe4aea712e1d621dd9dd214068e386645c53d9b9f70e5087c6baa.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
439b3a0d7affe4aea712e1d621dd9dd214068e386645c53d9b9f70e5087c6baa.exe
Resource
win10v2004-20240508-en
General
-
Target
439b3a0d7affe4aea712e1d621dd9dd214068e386645c53d9b9f70e5087c6baa.exe
-
Size
40KB
-
MD5
26d48322d22ba9214ffbb9169c2753ea
-
SHA1
0184d45a9533aba2ccec3a2549b0c035d1f8f917
-
SHA256
439b3a0d7affe4aea712e1d621dd9dd214068e386645c53d9b9f70e5087c6baa
-
SHA512
627fe88d67c9b1dc40e58af113c247e405d4d0a08c13aa326e1da7208e3550d8f2992ad334f9a473797440af8a70aba02072b80280a156efeaab29ff6bfa2a80
-
SSDEEP
768:tFyzDkT6EtqYNzCSmSnIO9l08Y9pvYBppw2eEhW:tAYNWSmvO9vIt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 439b3a0d7affe4aea712e1d621dd9dd214068e386645c53d9b9f70e5087c6baa.exe
Files
-
439b3a0d7affe4aea712e1d621dd9dd214068e386645c53d9b9f70e5087c6baa.exe.exe windows:6 windows x86 arch:x86
c9915bb278e6f29b32986d381b1eaaf6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetPriorityClass
GetCurrentProcess
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
RtlUnwind
OutputDebugStringA
InterlockedCompareExchange
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
Sleep
InterlockedDecrement
InterlockedIncrement
msvcrt
setvbuf
fwrite
fgetpos
fseek
fsetpos
fclose
__iob_func
abort
__crtLCMapStringA
__pctype_func
isupper
islower
__getmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
__uncaught_exception
memcpy
fflush
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_controlfp
isleadbyte
_iob
_snprintf
_itoa
wctomb
__badioinfo
__pioinfo
_fileno
_lseeki64
_write
_isatty
ungetc
fputc
fgetc
setlocale
___lc_handle_func
___lc_codepage_func
malloc
_callnewh
free
memmove
_errno
__CxxFrameHandler
strcspn
??0exception@@QAE@XZ
memchr
localeconv
memset
??1bad_cast@@UAE@XZ
_CxxThrowException
??0bad_cast@@QAE@ABV0@@Z
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBD@Z
user32
CallNextHookEx
PostQuitMessage
MapVirtualKeyA
GetAsyncKeyState
SetWindowsHookExA
interception
interception_send
interception_receive
interception_wait
interception_set_filter
interception_is_keyboard
interception_destroy_context
interception_create_context
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ