OpnFiles.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1bbc94eda884dcbda39d476e82bf7abf3ac2ad8fcd32a31bf89c45352221a1ab.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1bbc94eda884dcbda39d476e82bf7abf3ac2ad8fcd32a31bf89c45352221a1ab.exe
Resource
win10v2004-20240508-en
General
-
Target
1bbc94eda884dcbda39d476e82bf7abf3ac2ad8fcd32a31bf89c45352221a1ab
-
Size
104KB
-
MD5
4a3107367058e958b8d064de1f76c788
-
SHA1
7ad77186da52f39cb67379676d4b8a53ea9a5b85
-
SHA256
1bbc94eda884dcbda39d476e82bf7abf3ac2ad8fcd32a31bf89c45352221a1ab
-
SHA512
bb60f1711a7535cb0ffec96f9581465b852d4a8a31110f6f802990af635543f5cabc1a5aaf2bb89c86d72979f0ebee585a1a73aea8c5aa6ade36e12a32eb778f
-
SSDEEP
3072:Huugd5PY8yUsF2e8d2qNWzniOwF9YAMNxu:IPY8WYe8d2bO9YA6u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1bbc94eda884dcbda39d476e82bf7abf3ac2ad8fcd32a31bf89c45352221a1ab
Files
-
1bbc94eda884dcbda39d476e82bf7abf3ac2ad8fcd32a31bf89c45352221a1ab.exe windows:5 windows x86 arch:x86
f2177ecc673dae04436ff4acbdd10c15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
__set_app_type
_except_handler3
??1type_info@@UAE@XZ
__p__fmode
?terminate@@YAXXZ
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__winitenv
_wtol
malloc
realloc
wcsstr
free
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_wcsicmp
wcsncpy
_wgetcwd
_c_exit
_exit
_XcptFilter
_cexit
_controlfp
exit
calloc
wcstod
wcstol
wcsncmp
fflush
fprintf
wcschr
strtok
wcslen
_wcsnicmp
sprintf
wcstok
_iob
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
LookupAccountSidW
RegSetValueExW
RegConnectRegistryW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
kernel32
VerSetConditionMask
VerifyVersionInfoW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetTimeFormatW
WideCharToMultiByte
OpenProcess
GetStdHandle
GetConsoleScreenBufferInfo
CloseHandle
GetLogicalDrives
GetDriveTypeW
GetVolumeInformationW
lstrcpynW
FindFirstFileW
FindClose
SetConsoleCursorPosition
WriteConsoleW
LocalFree
FormatMessageW
ReadConsoleW
ReadFile
SetConsoleMode
GetConsoleMode
FileTimeToSystemTime
GetComputerNameExW
GetCurrentProcess
QueryPerformanceCounter
lstrlenW
lstrcpyW
SetLastError
lstrcmpW
lstrcatW
lstrcmpiW
GetLastError
CompareStringW
FreeLibrary
LoadLibraryW
GetSystemDirectoryW
GetProcAddress
GetComputerNameW
MultiByteToWideChar
VirtualQuery
VirtualAlloc
VirtualFree
ntdll
RtlDestroyQueryDebugBuffer
RtlFreeHeap
RtlInitAnsiString
RtlAnsiStringToUnicodeString
RtlAllocateHeap
NtQuerySystemInformation
RtlInitUnicodeString
user32
LoadStringW
CharUpperW
wsprintfW
mpr
WNetGetLastErrorW
WNetCancelConnection2W
WNetAddConnection2W
netapi32
NetFileClose
NetApiBufferFree
NetFileEnum
NetServerGetInfo
secur32
GetUserNameExW
ws2_32
WSACleanup
gethostbyaddr
inet_addr
WSAGetLastError
WSAStartup
gethostbyname
framedyn
?Left@CHString@@QBE?AV1@H@Z
?Mid@CHString@@QBE?AV1@HH@Z
??4CHString@@QAEABV0@ABV0@@Z
?Format@CHString@@QAAXPBGZZ
??0CHString@@QAE@XZ
??4CHString@@QAEABV0@PBG@Z
??1CHString@@QAE@XZ
?GetData@CHString@@IBEPAUCHStringData@@XZ
?MakeUpper@CHString@@QAEXXZ
?Find@CHString@@QBEHPBG@Z
?Right@CHString@@QBE?AV1@H@Z
??YCHString@@QAEABV0@PBG@Z
?Mid@CHString@@QBE?AV1@H@Z
?TrimRight@CHString@@QAEXXZ
??0CHString@@QAE@PBG@Z
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 21B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE