D:\projects\drweb-se\testing\drweb-se\Solution\Compiled\Win32\Release\Pdb\dwantispam.pdb
Static task
static1
Behavioral task
behavioral1
Sample
81725fd20e2b24f922df0920d963549b26d660d7337fa18372873ae103979059.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81725fd20e2b24f922df0920d963549b26d660d7337fa18372873ae103979059.exe
Resource
win10v2004-20240508-en
General
-
Target
81725fd20e2b24f922df0920d963549b26d660d7337fa18372873ae103979059
-
Size
781KB
-
MD5
c13aba53d63d89c416fd137f2e0e298c
-
SHA1
491e7c14a2743a8bcc8330c05b1e6f8f38ae37a2
-
SHA256
81725fd20e2b24f922df0920d963549b26d660d7337fa18372873ae103979059
-
SHA512
77213e7ecb7fe3d548e213d6ee5beb6eac3bd416d51a5f6a60f84dc2b8d1d0270dccc37a4631e9e9c2ded2129f78457efc086001cbbcbea6da8480f44060fa8b
-
SSDEEP
12288:7JCBUnuONnJKx5vYfg8zbOjGHqqJCMpTqMpgewtaZ9EbdZfAaEQVUNk8f8h971Fu:7JCBUHskfOJyT09cZ9ArCTk28b2KmR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 81725fd20e2b24f922df0920d963549b26d660d7337fa18372873ae103979059
Files
-
81725fd20e2b24f922df0920d963549b26d660d7337fa18372873ae103979059.exe windows:5 windows x86 arch:x86
ad482f35ac249e2a8e9ac4b8f8c3dfda
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntdll
RtlUnwind
RtlEnumProcessHeaps
NtQueryInformationProcess
LdrUnlockLoaderLock
LdrLockLoaderLock
RtlUpcaseUnicodeChar
kernel32
GetModuleFileNameA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapSize
SetStdHandle
FreeLibrary
LoadLibraryW
GetProcAddress
GetModuleHandleW
SetLastError
WideCharToMultiByte
SetUnhandledExceptionFilter
FreeConsole
SetErrorMode
SetFileApisToANSI
CloseHandle
InterlockedDecrement
GetLastError
InterlockedIncrement
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
VirtualQuery
HeapLock
HeapWalk
HeapUnlock
HeapAlloc
HeapFree
VirtualProtect
LoadLibraryA
FormatMessageA
FormatMessageW
LocalFree
UnmapViewOfFile
MapViewOfFile
InitializeCriticalSectionAndSpinCount
CreateEventW
DeleteCriticalSection
EnterCriticalSection
WaitForSingleObject
LeaveCriticalSection
SetEvent
WaitForSingleObjectEx
OpenProcess
CreateFileMappingW
CreateNamedPipeA
SetProcessWorkingSetSize
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
HeapReAlloc
GetFileType
EnumSystemLocalesW
IsValidLocale
GetACP
GetStdHandle
FreeLibraryAndExitThread
ExitThread
CreateThread
SetConsoleCtrlHandler
GetModuleHandleExW
ExitProcess
GetCommandLineW
GetCommandLineA
LoadLibraryExW
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
RaiseException
GetSystemInfo
LoadLibraryExA
CreateFileW
CreateFileMappingA
GetFileSize
GetProcessHeap
CreateFileA
Sleep
SetNamedPipeHandleState
ConnectNamedPipe
WaitForMultipleObjects
DisconnectNamedPipe
ReadFile
WriteFile
FindClose
GetModuleFileNameW
WriteConsoleW
GetStringTypeW
GetModuleHandleA
GetUserDefaultLCID
CreateEventA
OpenEventA
ResetEvent
GetNativeSystemInfo
GetVersion
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetFileSizeEx
SetFilePointerEx
MultiByteToWideChar
GetCurrentThreadId
GetCurrentProcessId
GetVersionExA
EncodePointer
DecodePointer
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
Sections
.text Size: 333KB - Virtual size: 333KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ