A:\FFFFFFFFFss.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b55c9060db77c1104fd6cf9c92dada7e7decfdd19e409a5b51495878997b1bc1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b55c9060db77c1104fd6cf9c92dada7e7decfdd19e409a5b51495878997b1bc1.exe
Resource
win10v2004-20240508-en
General
-
Target
b55c9060db77c1104fd6cf9c92dada7e7decfdd19e409a5b51495878997b1bc1
-
Size
348KB
-
MD5
4612be21e61785b0a7008458737d3e12
-
SHA1
e11eae15309a29758ae9280826646798af66131e
-
SHA256
b55c9060db77c1104fd6cf9c92dada7e7decfdd19e409a5b51495878997b1bc1
-
SHA512
2f8f3805d1a2c0a02ef712c45c7bf330d9c19486f682fc79383d31078337fca665dd32c57b42dd8bfe97363b486cd2de729f2239c1c16571d578c21723ad3af6
-
SSDEEP
6144:GmLvgrTuPTEkdOJRxwmMFL5gO2hdrCQ/D1+OpGD+sfYKT:vD5wuOzxw/FFF2hcaDVpGK+T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b55c9060db77c1104fd6cf9c92dada7e7decfdd19e409a5b51495878997b1bc1
Files
-
b55c9060db77c1104fd6cf9c92dada7e7decfdd19e409a5b51495878997b1bc1.exe windows:4 windows x86 arch:x86
2376a3f0ae02846914825d5a57784fe0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedExchange
GetTickCount
FindFirstChangeNotificationW
SetLocaleInfoA
CancelWaitableTimer
FreeEnvironmentStringsA
GetSystemPowerStatus
GetTimeFormatW
GetModuleFileNameA
GetComputerNameExW
QueueUserWorkItem
lstrlenW
GetSystemDefaultLangID
FindNextVolumeMountPointA
GetFileSize
GetProcessAffinityMask
GetSystemDirectoryA
EnumSystemLanguageGroupsW
GetLongPathNameA
HeapCompact
IsBadCodePtr
GetProfileStringW
OpenWaitableTimerW
WinExec
ResumeThread
CreateTimerQueue
GlobalLock
GlobalSize
QueryDosDeviceA
GetPriorityClass
VirtualFreeEx
GlobalGetAtomNameW
RegisterWaitForSingleObject
GetProcessVersion
SetCommConfig
DeleteTimerQueueTimer
ExpandEnvironmentStringsA
FreeLibrary
SetMessageWaitingIndicator
FlushConsoleInputBuffer
SetPriorityClass
GetCalendarInfoW
SetCalendarInfoA
SetHandleCount
SetProcessWorkingSetSize
MapViewOfFileEx
lstrcatA
user32
GetWindowLongA
GetTitleBarInfo
BroadcastSystemMessageW
CallNextHookEx
IsMenu
GetMenuStringA
SendMessageCallbackA
ScrollDC
CharUpperBuffA
SetMenuItemInfoW
CreateWindowExA
rpcrt4
RpcAsyncGetCallStatus
RpcEpRegisterW
RpcSmEnableAllocate
RpcBindingInqAuthInfoExA
NdrVaryingArrayBufferSize
NDRCContextBinding
NdrXmitOrRepAsFree
RpcStringBindingComposeW
NdrUserMarshalFree
RpcBindingSetAuthInfoExW
UuidToStringA
I_RpcServerUseProtseqEp2A
NdrSendReceive
RpcServerUnregisterIf
NdrEncapsulatedUnionBufferSize
I_RpcClearMutex
RpcSsDisableAllocate
RpcNsBindingInqEntryNameW
NDRSContextUnmarshallEx
NdrConformantVaryingArrayUnmarshall
pdh
PdhFormatFromRawValue
PdhEnumObjectsW
PdhEnumMachinesA
PdhUpdateLogFileCatalog
PdhGetFormattedCounterValue
PdhLookupPerfIndexByNameA
PdhGetDllVersion
PdhValidatePathW
PdhCloseLog
PdhEnumObjectsA
PdhGetDefaultPerfObjectA
PdhUpdateLogA
PdhRemoveCounter
PdhSetQueryTimeRange
PdhMakeCounterPathA
PdhExpandCounterPathW
PdhGetDefaultPerfCounterA
PdhSelectDataSourceA
PdhEnumObjectItemsW
PdhUpdateLogW
PdhParseInstanceNameA
PdhParseInstanceNameW
PdhGetDataSourceTimeRangeA
Sections
.text Size: 260KB - Virtual size: 257KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ