C:\dev\projects\desktoplauncher\win\Release\scopevisiowindowslauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e47df2c83c71702baf73765a80da1e7e4f4e29b824f24c686c3a41553b6af754.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e47df2c83c71702baf73765a80da1e7e4f4e29b824f24c686c3a41553b6af754.exe
Resource
win10v2004-20240508-en
General
-
Target
e47df2c83c71702baf73765a80da1e7e4f4e29b824f24c686c3a41553b6af754
-
Size
833KB
-
MD5
664fe8451eb4ce46b92f8c53199c2069
-
SHA1
648bbaecadcb5c66d509e4792ea07fd0a6ef1b8d
-
SHA256
e47df2c83c71702baf73765a80da1e7e4f4e29b824f24c686c3a41553b6af754
-
SHA512
32e830424879b58298355f55bf0d7dc9b46078bd0ec93014a71ddfda009561e02bfcdddb08445616c02b7c9bf1212ddcbaa71d75db16a9f0c1ebfd4bb1f33def
-
SSDEEP
12288:QbqkXJvhJqXRdSPFEjPtI1R9SIeT9v6MxJ/Y:CJ5JqBdqFKeSZ1vn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e47df2c83c71702baf73765a80da1e7e4f4e29b824f24c686c3a41553b6af754
Files
-
e47df2c83c71702baf73765a80da1e7e4f4e29b824f24c686c3a41553b6af754.exe windows:5 windows x86 arch:x86
50a3b9268144d189d6a21b183a6f8063
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesW
FormatMessageW
GetLastError
CloseHandle
LocalFree
GetFileSize
CreateProcessW
GetTempFileNameW
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
HeapReAlloc
HeapSize
CreateFileW
GetConsoleCP
FlushFileBuffers
GetProcessHeap
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
WaitForSingleObject
GetTempPathW
GetModuleFileNameW
WriteFile
GetCommandLineW
ReadFile
GetConsoleMode
CreateDirectoryW
FindFirstFileExW
FindClose
GetStringTypeW
LCMapStringW
GetFileType
HeapAlloc
HeapFree
GetACP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
RaiseException
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
DecodePointer
user32
GetClientRect
TranslateMessage
LoadBitmapW
InvalidateRect
SetTimer
DispatchMessageW
ShowWindow
GetSystemMetrics
PostQuitMessage
ReleaseDC
BeginPaint
EndPaint
RegisterClassW
CreateWindowExW
GetMessageW
DefWindowProcW
PostMessageW
GetDC
MessageBoxW
FillRect
gdi32
SelectObject
CreateCompatibleDC
DeleteDC
GetObjectW
DeleteObject
CreateSolidBrush
BitBlt
shell32
SHGetFolderPathW
SHFileOperationW
SHGetSpecialFolderPathW
CommandLineToArgvW
winhttp
WinHttpQueryDataAvailable
WinHttpConnect
WinHttpSetCredentials
WinHttpSendRequest
WinHttpQueryAuthSchemes
WinHttpGetIEProxyConfigForCurrentUser
WinHttpCloseHandle
WinHttpSetOption
WinHttpOpenRequest
WinHttpReadData
WinHttpQueryHeaders
WinHttpOpen
WinHttpReceiveResponse
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 355KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 351KB - Virtual size: 350KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ