E:\MyGit\mylibrary\PeMemoryRun\Debug\PeMemoryRun15.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143.exe
Resource
win10v2004-20240426-en
General
-
Target
0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143
-
Size
8.6MB
-
MD5
bc471aa8003024e1dbf68c7f183df4b3
-
SHA1
27f83844d7cea0910507441cb2e9babe3c88ef13
-
SHA256
0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143
-
SHA512
c1956ed80b6c8feb1cff6eccb233f4004ba1a4225517d5d76bef80d0114a24c35b3a3cbf86e25c0c76f0f780860596a0c7375652f12ff5319845180d88dd9e5a
-
SSDEEP
196608:K3/NSnzJi2/aJAvcnbDROJkXijRtLvq1I7icdiiBYX:w8fyJ0AbtOJyERtLvM+3PBY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143
Files
-
0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143.exe windows:5 windows x86 arch:x86
233d426b325f951af6166b6ddf7f2bfa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
CreateDialogIndirectParamA
advapi32
RegDeleteValueA
ole32
CoLockObjectExternal
oleaut32
SystemTimeToVariantTime
msimg32
TransparentBlt
shlwapi
PathRemoveFileSpecW
uxtheme
OpenThemeData
winmm
PlaySoundA
gdiplus
GdiplusStartup
oleacc
LresultFromObject
imm32
ImmGetContext
gdi32
SetWindowExtEx
winspool.drv
ClosePrinter
shell32
ShellExecuteA
Sections
.text Size: 8.6MB - Virtual size: 13.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE