C:\Users\Clive\source\repos\x86_driver\Release\x86.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe
Resource
win10v2004-20240508-en
General
-
Target
5f53734c5153ec3dd61e2a732a2ff03f.bin
-
Size
337KB
-
MD5
eb80dfe9c03309072da013a3d7f0dfd6
-
SHA1
0ba4410ec43ea9adaef088deac7610caf649b138
-
SHA256
f7d849a335b50bf81da529644ae92e48cb25f0368623807b5c37d6fd676d4042
-
SHA512
f8bde7a6e1cd0f08615a80aa6ee34ce301b9977c20435376940e94048d3606a91278ffc71319dc6de0042a8d548fa7356260e5047736657838a657fa5da390d8
-
SSDEEP
6144:aPlTXY4JhANL8B+YQT03lUPthk0yiB+LznIDp2lGxeC6qvtXj/0:ilTXYXLmXQg3ebPN+XIDp2lweC6Gj/0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe
Files
-
5f53734c5153ec3dd61e2a732a2ff03f.bin.zip
Password: infected
-
3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe.exe windows:6 windows x86 arch:x86
Password: infected
28ad50542f813b012843ce887d0559ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathIsDirectoryA
PathFileExistsA
advapi32
RegSetValueExW
RegSetValueExA
OpenProcessToken
AdjustTokenPrivileges
RegFlushKey
RegCreateKeyExW
LookupPrivilegeValueA
user32
wsprintfA
SetWindowPos
IsWindowVisible
GetAsyncKeyState
MapVirtualKeyA
GetSystemMetrics
GetWindowRect
GetCursorPos
EnumWindows
GetWindow
GetWindowThreadProcessId
GetTopWindow
ntdll
RtlUnwind
RtlInitUnicodeString
RtlDosPathNameToNtPathName_U
NtLoadDriver
NtQuerySystemInformation
winhttp
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
kernel32
SetStdHandle
QueryDosDeviceA
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
GetCurrentDirectoryW
DeleteFileW
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetCommandLineA
GetStdHandle
GetModuleFileNameW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindNextFileW
FindFirstFileExW
FindClose
GetFullPathNameW
GetDriveTypeW
GetModuleHandleExW
ExitProcess
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
CreateFileW
WriteFile
CloseHandle
GetCurrentDirectoryA
CreateDirectoryA
CreateFileA
GetFileSize
ReadFile
SetFilePointer
DecodePointer
RaiseException
GetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
Sleep
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
OpenProcess
GetModuleHandleA
GetProcAddress
LoadResource
LockResource
SizeofResource
lstrcmpiA
lstrcpyA
lstrcatA
lstrlenA
GetLogicalDriveStringsA
FindResourceA
GetPrivateProfileStringA
WritePrivateProfileStringA
WriteConsoleW
CopyFileA
IsBadReadPtr
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32First
Process32Next
K32GetProcessImageFileNameA
EnterCriticalSection
LeaveCriticalSection
EncodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
TlsGetValue
TlsAlloc
SetLastError
shell32
ShellExecuteA
wininet
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetOpenA
Sections
.text Size: 402KB - Virtual size: 401KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 381.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ