b:\source\source.IC\50995\Release_WDEXE_132\WX\Win32\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
857a6fb1b2b89fd7d8460ad8cd78d9478002ed3b75356c881064b5a28846e460.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
857a6fb1b2b89fd7d8460ad8cd78d9478002ed3b75356c881064b5a28846e460.exe
Resource
win10v2004-20240508-en
General
-
Target
857a6fb1b2b89fd7d8460ad8cd78d9478002ed3b75356c881064b5a28846e460
-
Size
2.0MB
-
MD5
1f5de33d617dff69612e1a1d8a024d03
-
SHA1
1c20ed48d8c79f054aaf435f8ccb8509f78d2ee9
-
SHA256
857a6fb1b2b89fd7d8460ad8cd78d9478002ed3b75356c881064b5a28846e460
-
SHA512
ae5eb81cf714fe7568eee08d1178a83813040d1a3747aa6c79b60152054e7e9ce92f4cab528dd4c6736f42b86aba6b100ba7672fc81c93d630cbbf05ac26a524
-
SSDEEP
49152:pdvoi2QD3nzVxL5UDMzQgoq9CHZyzbB2i15Q:pz2QnL9QzZYB2GQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 857a6fb1b2b89fd7d8460ad8cd78d9478002ed3b75356c881064b5a28846e460
Files
-
857a6fb1b2b89fd7d8460ad8cd78d9478002ed3b75356c881064b5a28846e460.exe windows:4 windows x86 arch:x86
56472289084bdd285b6a18029c327177
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
_except_handler3
_onexit
__dllonexit
_lfind
vsprintf
memcmp
iswspace
_vsnprintf
strchr
realloc
towupper
wcspbrk
_wmakepath
_wstati64
_wcsupr
strcat
memmove
wcschr
atoi
strlen
wcsstr
vswprintf
wcscmp
_vsnwprintf
_wcsnicmp
swprintf
_wtoi
strncmp
memcpy
_wcsicmp
gmtime
time
free
malloc
memset
wcsrchr
wcsncpy
wcscpy
wcslen
wcscat
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
kernel32
ReleaseMutex
RaiseException
InterlockedExchange
GetSystemDefaultLangID
CreateThread
TerminateThread
ResumeThread
CreateProcessW
InterlockedDecrement
ReleaseSemaphore
CreateSemaphoreW
LoadLibraryA
WideCharToMultiByte
GetCurrentThreadId
TlsFree
TlsAlloc
VirtualProtect
VirtualQuery
TlsGetValue
TlsSetValue
GetDriveTypeW
GetFullPathNameW
FindNextFileW
SetFileAttributesW
GetFileAttributesW
FindClose
FindFirstFileW
CreateDirectoryW
CopyFileW
MoveFileW
DeleteFileW
CreateFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
SetErrorMode
SetEndOfFile
FlushFileBuffers
UnlockFileEx
UnlockFile
LockFileEx
LockFile
SetFilePointer
WriteFile
GetVolumeInformationW
GetLogicalDriveStringsW
GetFileInformationByHandle
LoadLibraryW
GetVersionExW
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchangeAdd
InterlockedIncrement
WritePrivateProfileStringW
CreateMailslotW
ExpandEnvironmentStringsW
GetLocalTime
GetComputerNameW
GetProfileStringW
ReadFile
GetExitCodeProcess
GetMailslotInfo
Sleep
GetPrivateProfileStringW
GetModuleFileNameW
GetLastError
CreateFileMappingW
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
CreateEventW
GetStartupInfoW
MulDiv
SetEvent
CreateMutexW
WaitForSingleObject
OpenFileMappingW
FreeLibrary
FindResourceW
LoadResource
LockResource
FreeResource
GetTempPathW
GetTempFileNameW
GetCurrentProcessId
FormatMessageW
LocalFree
GetCommandLineW
ExitProcess
GetPrivateProfileIntW
Exports
Exports
CommandeComposante
DeclareProxy
Execution
LibereMutex
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 180KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ