cmdl32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
96e07521774c2323748b514466fcf834b3601c08eeeae4b9c7ca50ce7c54f821.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96e07521774c2323748b514466fcf834b3601c08eeeae4b9c7ca50ce7c54f821.exe
Resource
win10v2004-20240508-en
General
-
Target
96e07521774c2323748b514466fcf834b3601c08eeeae4b9c7ca50ce7c54f821
-
Size
4.0MB
-
MD5
141fc3c1b56763d259660e801c694a43
-
SHA1
c88e1e7159b4993a432a7de9c84a3d40f2ffe8bf
-
SHA256
96e07521774c2323748b514466fcf834b3601c08eeeae4b9c7ca50ce7c54f821
-
SHA512
7a065210fdb6333a88a1ade06455531bdc9ec19ad64d982013cd47baa552a2a2ceb3894c719bd77383543fe44f812e6b1f84eab8506e0bd43bcc45a335c30084
-
SSDEEP
24576:l0K+JtTFcor6U9/639q/89JJd3n+Otv2K5iP7i72e8EioJ9JJd3n+Otv2K5iP7i4:mK+JLcor69tnOyCPO7PdOyCPO7Si886
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 96e07521774c2323748b514466fcf834b3601c08eeeae4b9c7ca50ce7c54f821
Files
-
96e07521774c2323748b514466fcf834b3601c08eeeae4b9c7ca50ce7c54f821.exe windows:5 windows x86 arch:x86
9f66c5e602a1bfa2a29ccbb4934c01e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcess
CreateMutexA
ReleaseMutex
GetPrivateProfileSectionA
GetModuleHandleA
ExitProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
CreateDirectoryA
GetCurrentProcessId
CloseHandle
SetEndOfFile
SetFilePointer
CreateFileA
SetLastError
lstrcpyA
GetLastError
ReadFile
WriteFile
GetTempFileNameA
GetTempPathA
lstrlenA
SetFileAttributesA
lstrcmpiA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrcatA
GetFileSize
lstrcpynA
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
lstrcmpA
FindFirstFileA
WritePrivateProfileStringA
CopyFileA
FlushFileBuffers
Sleep
WaitForSingleObject
SetEvent
GetTickCount
CreateThread
CreateEventA
GetPrivateProfileStringA
ConvertDefaultLocale
GetVersionExA
GetSystemInfo
GetPrivateProfileIntA
SetCurrentDirectoryA
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryExA
user32
CharNextA
DialogBoxParamA
RegisterWindowMessageA
GetClassInfoExA
RegisterClassExA
GetWindowLongA
EnableMenuItem
SetWindowLongA
GetWindowRect
SystemParametersInfoA
GetSystemMetrics
MoveWindow
GetDlgItemTextA
SetDlgItemTextA
wsprintfA
PostMessageA
SetWindowTextA
SendDlgItemMessageA
ShowWindow
KillTimer
SetFocus
EndDialog
cmpbk32
PhoneBookMergeChanges
PhoneBookLoad
PhoneBookFreeFilter
PhoneBookParseInfoA
PhoneBookUnload
cmutil
CmFree
CmMalloc
CmStrCpyAllocA
CmRealloc
CmStrchrA
CmFmtMsgA
?Log@CmLogFile@@QAAXW4_CMLOG_ITEM@@ZZ
CmStrrchrA
CmLoadSmallIconA
CmLoadIconA
?Stop@CmLogFile@@QAEJXZ
?Start@CmLogFile@@QAEJH@Z
?SetParams@CmLogFile@@QAEJHKPBD@Z
?Init@CmLogFile@@QAEJPAUHINSTANCE__@@HPBD@Z
GetOSVersion
??0CmLogFile@@QAE@XZ
?DeInit@CmLogFile@@QAEJXZ
CmBuildFullPathFromRelativeA
comctl32
ord17
rasapi32
RasEnumConnectionsA
wininet
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetOpenA
InternetConnectA
FtpFindFirstFileA
InternetFindNextFileA
InternetCloseHandle
FtpOpenFileA
InternetReadFile
InternetCrackUrlA
InternetSetOptionA
InternetOpenUrlA
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ