C:\ITS\Azure Agent 01\_work\58\s\ITSEdgeSecureBrowser\Release\ITSEdgeBrowser.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b9acba8827e6ceefade30ae29a62d760f05ff2f72e797d7b7ef8111a38289a9d.exe
Resource
win7-20240221-en
General
-
Target
b9acba8827e6ceefade30ae29a62d760f05ff2f72e797d7b7ef8111a38289a9d
-
Size
5.4MB
-
MD5
0fa5bc1b44dab64ce48a52e6b40e8f6c
-
SHA1
89fe67af74dee7c5450b54f5b6421879ae95d18d
-
SHA256
b9acba8827e6ceefade30ae29a62d760f05ff2f72e797d7b7ef8111a38289a9d
-
SHA512
64622f4471d0b2076242cbe982519dd5b59870daf27e2e17674393dc61f73e9b5bb9d28cc8b546786682fbb5e0d3834845a3322e2dc1bd94f1aeca3bd9c2a7e3
-
SSDEEP
98304:7o7mHQ5Rkkw7SylTk30U3ouvpH/VRcsXfWDH4wk+vmpoy3s7FHQfQby:7oFnTylTk30EH/Df0u+fy4Vy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9acba8827e6ceefade30ae29a62d760f05ff2f72e797d7b7ef8111a38289a9d
Files
-
b9acba8827e6ceefade30ae29a62d760f05ff2f72e797d7b7ef8111a38289a9d.exe windows:6 windows x86 arch:x86
6a8ace3f4be6338a97354af4b5a46c8b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoA
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoSizeW
GetFileVersionInfoSizeA
kernel32
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
FindClose
FindFirstFileA
FindNextFileA
MultiByteToWideChar
WideCharToMultiByte
DeleteFileA
GetFileAttributesExA
FileTimeToSystemTime
FreeLibrary
LoadLibraryA
CreateDirectoryW
CreateFileW
DeleteFileW
FindFirstFileW
FindNextFileW
RemoveDirectoryW
WriteFile
GetTempPathW
GetTempPathA
SetEvent
CreateMutexA
CreateThread
OpenProcess
GetTickCount64
GetModuleFileNameW
GetModuleHandleA
LoadResource
LockResource
SizeofResource
LoadLibraryW
OpenMutexA
FindResourceA
K32GetProcessImageFileNameA
GlobalReAlloc
CreateFileA
GetDriveTypeA
GetFileAttributesW
GetCurrentThreadId
CreateProcessW
GetVersionExA
LocalAlloc
LocalFree
lstrcmpA
lstrcpyW
GetLogicalDriveStringsA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCommandLineW
GetTempFileNameW
DecodePointer
RaiseException
HeapDestroy
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
HeapFree
RegisterApplicationRestart
GlobalMemoryStatusEx
ReleaseMutex
GetComputerNameW
GetSystemTime
SystemTimeToFileTime
OutputDebugStringA
LoadLibraryExW
GetEnvironmentVariableW
GetStringTypeW
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
CreateEventW
ResetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringEx
CompareStringEx
GetModuleFileNameA
GetCurrentProcessId
CreateSemaphoreExW
CreateMutexExW
OpenSemaphoreW
WaitForSingleObjectEx
TerminateProcess
WaitForSingleObject
GetCPInfo
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCommandLineA
ReadFile
EncodePointer
ExitProcess
GetStdHandle
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReleaseSemaphore
HeapAlloc
SetLastError
GetLastError
CloseHandle
OutputDebugStringW
DebugBreak
IsDebuggerPresent
SetStdHandle
GlobalMemoryStatus
GetProcessHeap
GlobalFree
GlobalAlloc
GetFileSizeEx
FlushFileBuffers
GetConsoleOutputCP
SetEndOfFile
DeleteCriticalSection
WriteConsoleW
user32
GetClientRect
SetWindowTextA
EndPaint
BeginPaint
GetSystemMetrics
GetRawInputData
GetRawInputDeviceInfoA
GetRawInputDeviceList
SetWindowDisplayAffinity
EnableWindow
GetKeyState
EndDialog
DialogBoxParamA
CreateWindowExW
RegisterClassExW
PostQuitMessage
LoadStringW
RegisterRawInputDevices
GetAncestor
SetWinEventHook
EnumDisplayMonitors
IsDialogMessageA
GetWindowThreadProcessId
GetClassNameA
FindWindowExA
FindWindowA
GetDesktopWindow
SetWindowLongA
GetWindowLongA
MessageBoxA
GetWindowTextA
SetForegroundWindow
GetForegroundWindow
UpdateWindow
TranslateAcceleratorA
LoadAcceleratorsA
SendInput
GetAsyncKeyState
BringWindowToTop
IsIconic
SetWindowPos
ShowWindow
DestroyWindow
IsWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
AttachThreadInput
PostMessageA
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfW
EmptyClipboard
CloseClipboard
OpenClipboard
wsprintfA
MessageBoxW
SetWindowTextW
GetWindow
advapi32
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExA
GetUserNameA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetUserNameW
EventRegister
EventSetInformation
EventWriteTransfer
EventUnregister
RegGetValueW
RegOpenKeyExW
shell32
ShellExecuteW
ShellExecuteExA
ShellExecuteExW
SHGetPropertyStoreForWindow
SetCurrentProcessExplicitAppUserModelID
SHGetSpecialFolderPathA
SHCreateItemFromParsingName
SHGetSpecialFolderPathW
ShellExecuteA
SHChangeNotify
shlwapi
PathFileExistsW
PathFindFileNameW
PathRemoveExtensionW
PathRemoveFileSpecW
PathRemoveFileSpecA
PathFindFileNameA
ole32
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
OleUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
SysAllocString
VariantInit
SysStringLen
SysFreeString
SysAllocStringLen
LoadTypeLi
urlmon
URLDownloadToFileA
CoInternetCreateZoneManager
CreateUri
wininet
InternetQueryOptionA
InternetGetConnectedState
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetOpenUrlA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetCanonicalizeUrlA
InternetSetOptionA
crypt32
CryptDecodeObject
CertFindCertificateInStore
CertGetNameStringA
CryptQueryObject
CertGetNameStringW
CertFreeCertificateChain
CryptMsgGetParam
wintrust
WinVerifyTrust
Sections
.text Size: 434KB - Virtual size: 434KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 240KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.5MB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ