conime.pdb
Static task
static1
Behavioral task
behavioral1
Sample
801d12f55b8f7ee0dded879d19c0278c0b37d6fe7e331b09c01df776b8fa0a0c.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
801d12f55b8f7ee0dded879d19c0278c0b37d6fe7e331b09c01df776b8fa0a0c.exe
Resource
win10v2004-20240508-en
General
-
Target
801d12f55b8f7ee0dded879d19c0278c0b37d6fe7e331b09c01df776b8fa0a0c
-
Size
54KB
-
MD5
043499b4166d3ee153156d3583dec4e4
-
SHA1
8f4d2b91413332611e280bc4b43248e5488f768c
-
SHA256
801d12f55b8f7ee0dded879d19c0278c0b37d6fe7e331b09c01df776b8fa0a0c
-
SHA512
23b35b8ad629fccd79c8ad307f27fda150ec2b0eecf7523228204f8ae4f233650835d93d5955787985c4a1d4707924ef5ae92757decc65825ec12728a0f590ab
-
SSDEEP
768:v/qu3FG11xvqrIKA/lGK+cZahN/ej+1E1c8X0LJM+UrnVT7rXcEXxnpPjTILXmwy:XqaFJJA/MxOc8kM++ntX7npjki2qJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 801d12f55b8f7ee0dded879d19c0278c0b37d6fe7e331b09c01df776b8fa0a0c
Files
-
801d12f55b8f7ee0dded879d19c0278c0b37d6fe7e331b09c01df776b8fa0a0c.exe windows:5 windows x86 arch:x86
d23314c5bd8326712a667023f475bd80
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleA
RegisterConsoleIME
UnregisterConsoleIME
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
lstrlenW
lstrcpyW
lstrcatW
lstrcpynW
WideCharToMultiByte
GetSystemDirectoryW
SetCurrentDirectoryW
OpenEventW
SetEvent
CloseHandle
LocalAlloc
LocalFree
GetStartupInfoA
GetCurrentThreadId
user32
IsWindowEnabled
ActivateKeyboardLayout
PostMessageW
GetKeyboardLayoutList
SendMessageTimeoutW
PostQuitMessage
SetForegroundWindow
DefWindowProcW
EnableWindow
DestroyWindow
GetKeyState
GetKeyboardLayoutNameW
GetMessageW
TranslateMessage
DispatchMessageW
LoadStringW
LoadIconW
LoadCursorW
RegisterClassW
GetSystemMetrics
CreateWindowExW
UnregisterClassW
AttachThreadInput
ntdll
RtlLeaveCriticalSection
NtOpenProcessToken
RtlUnicodeToMultiByteSize
NtQueryInformationToken
NtClose
RtlInitializeCriticalSection
NtQueryVirtualMemory
RtlUnwind
RtlCopyLuid
RtlEnterCriticalSection
imm32
ImmGetContext
ImmReleaseContext
ImmGetConversionStatus
ImmGetGuideLineW
ImmSetConversionStatus
ImmSimulateHotKey
ImmGetIMEFileNameW
ImmEscapeW
ImmDisableTextFrameService
ImmGetOpenStatus
ImmNotifyIME
ImmGetCandidateListW
ImmGetCompositionStringW
ImmSetActiveContextConsoleIME
ImmTranslateMessage
ImmCallImeConsoleIME
ImmGetProperty
ImmCreateContext
ImmAssociateContext
ImmSetOpenStatus
ImmDestroyContext
ImmIsIME
gdi32
GetStockObject
msvcrt
_controlfp
__set_app_type
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE