C:\actions-runner\_work\client\client\host\build\MinSizeRel\host.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6b763382e9dea7cdcfcda2484326c13cd9286369d779b3df8244c6575f0d5294.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6b763382e9dea7cdcfcda2484326c13cd9286369d779b3df8244c6575f0d5294.exe
Resource
win10v2004-20240508-en
General
-
Target
6b763382e9dea7cdcfcda2484326c13cd9286369d779b3df8244c6575f0d5294
-
Size
2.6MB
-
MD5
27693f46c1f484cd80c2605cbe6d7478
-
SHA1
74a468a923587a960f5d0c084d8d193f2c52affa
-
SHA256
6b763382e9dea7cdcfcda2484326c13cd9286369d779b3df8244c6575f0d5294
-
SHA512
b74b243e29ed2e19290afd0f42540978651e8a157a31a3f306f3b45f6c66cdc9c8d51bada32d1a16d232b63d1d4efcf1d6a00fbe4eea0456a2aa9a93767cdda3
-
SSDEEP
49152:FGUXgwPbjXOizYTg8QBoos7BtlC2qRPQzLnWTw9VnbHi/aAGZM1j:FGUXXPvOiyg82ontlpgPQzLteq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6b763382e9dea7cdcfcda2484326c13cd9286369d779b3df8244c6575f0d5294
Files
-
6b763382e9dea7cdcfcda2484326c13cd9286369d779b3df8244c6575f0d5294.exe windows:6 windows x86 arch:x86
66667c267abe0bf6ab37bb43b01f4d42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dbghelp
SymSetOptions
SymGetLineFromAddr64
SymFromAddr
SymSetSearchPathW
SymGetSearchPathW
SymInitialize
SymCleanup
version
VerQueryValueW
VerQueryValueA
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
GetFileVersionInfoSizeW
GetFileVersionInfoW
winhttp
WinHttpSetStatusCallback
WinHttpOpen
WinHttpCloseHandle
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
kernel32
CreateThread
IsBadReadPtr
FlushInstructionCache
HeapSize
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetTimeZoneInformation
ReadConsoleW
FreeLibraryAndExitThread
ExitThread
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
TerminateProcess
GetModuleHandleW
GlobalAlloc
GlobalFree
CompareStringW
DeleteFileW
GetLastError
SetEnvironmentVariableW
VerSetConditionMask
GetCommandLineW
VerifyVersionInfoW
GetFileAttributesW
GetModuleFileNameW
OutputDebugStringA
OutputDebugStringW
GetProcAddress
LoadLibraryExW
LoadLibraryW
FreeLibrary
GetEnvironmentVariableW
GetStdHandle
CreateFileA
CreateFileW
QueryDosDeviceW
WriteFile
IsDebuggerPresent
CloseHandle
HeapAlloc
HeapFree
GetProcessHeap
DeviceIoControl
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetProcessId
InitializeProcThreadAttributeList
DeleteProcThreadAttributeList
UpdateProcThreadAttribute
OpenProcess
GlobalMemoryStatusEx
GetSystemDirectoryW
GetWindowsDirectoryW
CreateFileMappingW
MapViewOfFile
FreeResource
GetModuleHandleA
LoadResource
LockResource
SizeofResource
FindResourceW
LocalAlloc
LocalFree
SetThreadExecutionState
MoveFileWithProgressW
AllocConsole
FreeConsole
SetConsoleCtrlHandler
SetConsoleTitleW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetDiskFreeSpaceW
GetFileAttributesExW
GetLongPathNameW
RemoveDirectoryW
SetEndOfFile
SetFileAttributesW
SetFileInformationByHandle
SetFileTime
GetTempPathW
RaiseException
GetOverlappedResult
Sleep
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
SetThreadPriority
GetNativeSystemInfo
VirtualQuery
UnmapViewOfFile
FormatMessageA
CopyFileExW
MoveFileExW
FileTimeToSystemTime
SystemTimeToFileTime
GetFileInformationByHandleEx
GetLocaleInfoEx
ReadFile
SetFilePointerEx
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
MulDiv
IsProcessorFeaturePresent
GetTickCount64
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FlushFileBuffers
SetHandleInformation
CreatePipe
ConnectNamedPipe
DisconnectNamedPipe
PeekNamedPipe
CreateNamedPipeW
WaitNamedPipeW
SetLastError
SetEvent
ResetEvent
CreateEventW
ReleaseSemaphore
OpenSemaphoreW
CreateSemaphoreW
RtlCaptureContext
SetUnhandledExceptionFilter
TerminateThread
VirtualQueryEx
DuplicateHandle
SetNamedPipeHandleState
TransactNamedPipe
WaitForMultipleObjects
HeapSetInformation
SetProcessDEPPolicy
VirtualAllocEx
UnregisterWait
RegisterWaitForSingleObject
TerminateJobObject
GetModuleHandleExW
SetInformationJobObject
GetUserDefaultLangID
GetUserDefaultLCID
GetUserDefaultLocaleName
EnumSystemLocalesEx
HeapDestroy
GetTickCount
GetVersionExW
GetProductInfo
IsWow64Process
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
UnregisterWaitEx
GetThreadId
GetThreadPriority
GetFileType
AssignProcessToJobObject
WriteProcessMemory
ReadProcessMemory
GetCurrentProcessorNumber
SetThreadAffinityMask
VirtualFree
GetProcessHeaps
ExpandEnvironmentStringsW
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
GetLocalTime
CreateJobObjectW
QueryInformationJobObject
VirtualProtectEx
CreateMutexW
VirtualFreeEx
GetProcessHandleCount
TlsGetValue
lstrlenW
DebugBreak
GetFileSizeEx
FindFirstFileExW
TlsAlloc
TlsFree
TlsSetValue
RtlCaptureStackBackTrace
CreateRemoteThread
GetSystemInfo
WideCharToMultiByte
MultiByteToWideChar
ExitProcess
VirtualProtect
LoadLibraryExA
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
GetStartupInfoW
InitializeSListHead
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlUnwind
Exports
Exports
GetHandleVerifier
GetMainTargetServices
IsSandboxedProcess
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 326KB - Virtual size: 325KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ