DFDWiz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e3d048508ff1a6c4e03cdeb42336717b69332bc9fe97fa6d8dafebd867f0dd27.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e3d048508ff1a6c4e03cdeb42336717b69332bc9fe97fa6d8dafebd867f0dd27.exe
Resource
win10v2004-20240508-en
General
-
Target
e3d048508ff1a6c4e03cdeb42336717b69332bc9fe97fa6d8dafebd867f0dd27
-
Size
94KB
-
MD5
1bf88e141be65d0a0b09798e144b53a7
-
SHA1
231693e78661f8d72a969722a6c6de29e8a3d9d9
-
SHA256
e3d048508ff1a6c4e03cdeb42336717b69332bc9fe97fa6d8dafebd867f0dd27
-
SHA512
f656bc58d4543bb9c1373b374a7b57f837131e69b7b8fe06e570122551386c9f98261901dbd93ed82fa1fe29674f2c6e5da88585abf3239fa88441a75e76452a
-
SSDEEP
768:aMSAiIMomA49YH1tz09wh1ZN/d/5MOBg6m9bgem5x85FZlc9+Huy+zXCRUR/lX8m:aFv0H1lHh1bd/5M+65nl8gh++4lXn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e3d048508ff1a6c4e03cdeb42336717b69332bc9fe97fa6d8dafebd867f0dd27
Files
-
e3d048508ff1a6c4e03cdeb42336717b69332bc9fe97fa6d8dafebd867f0dd27.exe windows:6 windows x86 arch:x86
53af0e433b3e79ed57056036bac89ed1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
TraceMessage
OpenProcessToken
RegEnumKeyExW
EventWrite
RegDeleteKeyW
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
LookupPrivilegeValueW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
InitiateShutdownW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
EventUnregister
EventRegister
RegEnumValueW
kernel32
GlobalFree
MulDiv
HeapFree
HeapAlloc
WriteFile
CreateFileW
GetCurrentProcess
GetCurrentThreadId
CreateMutexW
CreateEventW
GetVersionExW
FormatMessageW
GetProcessHeap
RegisterApplicationRestart
HeapSetInformation
GetSystemTime
SystemTimeToFileTime
CloseHandle
LoadLibraryA
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetLastError
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetModuleHandleA
OpenMutexW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
GetVolumePathNamesForVolumeNameW
DeviceIoControl
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
LocalFree
gdi32
DeleteObject
SetAbortProc
SetMapMode
GetDeviceCaps
CreateFontIndirectW
SelectObject
StartDocW
StartPage
EndPage
EndDoc
AbortDoc
DeleteDC
user32
DialogBoxParamW
EndDialog
DefWindowProcW
SetWindowLongW
DestroyWindow
SetDlgItemTextW
LoadStringW
MessageBoxW
SetCursor
SendMessageW
DrawTextW
EnumThreadWindows
GetWindowLongW
SetWindowPos
LoadIconW
CreateWindowExW
MsgWaitForMultipleObjects
DispatchMessageW
PeekMessageW
LoadCursorW
PostMessageW
GetParent
ShowWindow
GetDlgItem
IsDialogMessageW
SetFocus
EnableWindow
CreateDialogParamW
TranslateMessage
msvcrt
_ftol2_sse
_wcslwr
_wcsupr
wcsstr
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
_vsnwprintf
__getmainargs
_controlfp
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
__CxxFrameHandler3
_wcsicmp
memcpy
_cexit
ole32
CoInitializeEx
CoCreateInstance
CoInitialize
CoUninitialize
CoCreateGuid
StringFromGUID2
ntdll
WinSqmAddToStream
WinSqmSetDWORD
WinSqmEndSession
NtQuerySystemTime
WinSqmStartSession
userenv
GetUserProfileDirectoryW
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE