E:\codes from net\webbrowser\Debug\WebBrowser.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0b0b05fbb3bd20055004fa0ced567f2279ea14506d1bd4ea05af4741b3b6aef0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b0b05fbb3bd20055004fa0ced567f2279ea14506d1bd4ea05af4741b3b6aef0.exe
Resource
win10v2004-20240508-en
General
-
Target
0b0b05fbb3bd20055004fa0ced567f2279ea14506d1bd4ea05af4741b3b6aef0
-
Size
116KB
-
MD5
848643a2929fabb929bfa3898e47ca42
-
SHA1
386667f18bbffb5fc954b4dfd7d413da214baca5
-
SHA256
0b0b05fbb3bd20055004fa0ced567f2279ea14506d1bd4ea05af4741b3b6aef0
-
SHA512
0b197aa8fc5ac89442dc2b47962ef623d5ec5158215b84b3ce203d97635b9b1384cfbec38ffed4b123b6a3a6e8195da3ab915fe65fa21515a56a480bd07d78a9
-
SSDEEP
768:Ip2hqiZOHNctsHLQF2jhKO4Q60opTsUuPDMCtUXNl1OumZU9:IpaIH7HkF2914Q2GftUXFOZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b0b05fbb3bd20055004fa0ced567f2279ea14506d1bd4ea05af4741b3b6aef0
Files
-
0b0b05fbb3bd20055004fa0ced567f2279ea14506d1bd4ea05af4741b3b6aef0.exe windows:5 windows x86 arch:x86
a32fc704dc2ac27218ea271a98e96e17
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
lstrcmpW
VirtualQuery
GetProcessHeap
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetModuleHandleW
DecodePointer
LoadLibraryW
GetProcAddress
lstrlenA
RaiseException
MultiByteToWideChar
WideCharToMultiByte
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
QueryPerformanceCounter
GetModuleFileNameW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
EncodePointer
FreeLibrary
user32
ShowWindow
MessageBoxW
DispatchMessageW
GetParent
PostQuitMessage
LoadIconW
TranslateMessage
CreateDialogParamW
SendMessageW
GetClientRect
LoadAcceleratorsW
GetMessageW
IsDialogMessageW
TranslateAcceleratorW
ole32
OleCreate
StgCreateDocfile
OleInitialize
oleaut32
VariantClear
VariantInit
comctl32
InitCommonControlsEx
msvcr100d
_CRT_RTC_INITW
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_amsg_exit
__getmainargs
_exit
_XcptFilter
_cexit
exit
memcpy
_acmdln
_CrtSetCheckCount
memset
_initterm
_initterm_e
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
_wmakepath_s
wcscpy_s
_wsplitpath_s
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
wcslen
_CrtDbgReportW
_CxxThrowException
memmove
memcmp
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler3
_ismbblead
msvcp100d
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Orphan_all@_Container_base12@std@@QAEXXZ
??0_Container_base12@std@@QAE@XZ
??1_Container_base12@std@@QAE@XZ
?_Debug_message@std@@YAXPB_W0I@Z
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ