E:\MyGit\mylibrary\PeMemoryRun\Debug\PeMemoryRun15.pdb
Static task
static1
Behavioral task
behavioral1
Sample
298acbfa347cec0cc32d702a65d878e7121d19bcf911955041c4e579942940e4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
298acbfa347cec0cc32d702a65d878e7121d19bcf911955041c4e579942940e4.exe
Resource
win10v2004-20240508-en
General
-
Target
298acbfa347cec0cc32d702a65d878e7121d19bcf911955041c4e579942940e4
-
Size
8.1MB
-
MD5
2e728ef3d65402d4a4e215e419829d9a
-
SHA1
72c3fbda02099ea0ff5e84796436d9587a2ca79f
-
SHA256
298acbfa347cec0cc32d702a65d878e7121d19bcf911955041c4e579942940e4
-
SHA512
05aa089101c78c270d80b770d463fd6573c329d7db2c45c233d74ab07645072d35d87691007e7cc6afa1f9e7fabaff1a9f25e8dece825d7256d6d0a3759e82b5
-
SSDEEP
196608:73/vkIReBmx7NKOUrzOJbo0PR/gEcd1iQHPA5vh:DkIResbQrzSDZIfvrHy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 298acbfa347cec0cc32d702a65d878e7121d19bcf911955041c4e579942940e4
Files
-
298acbfa347cec0cc32d702a65d878e7121d19bcf911955041c4e579942940e4.exe windows:5 windows x86 arch:x86
233d426b325f951af6166b6ddf7f2bfa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
CreateDialogIndirectParamA
advapi32
RegDeleteValueA
ole32
CoLockObjectExternal
oleaut32
SystemTimeToVariantTime
msimg32
TransparentBlt
shlwapi
PathRemoveFileSpecW
uxtheme
OpenThemeData
winmm
PlaySoundA
gdiplus
GdiplusStartup
oleacc
LresultFromObject
imm32
ImmGetContext
gdi32
SetWindowExtEx
winspool.drv
ClosePrinter
shell32
ShellExecuteA
Sections
.text Size: 8.0MB - Virtual size: 13.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE