F:\RunDll\x64\Release\main.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7a278e40dd75d2b1f7a7b30d97350f579caa47efb7880348c89de450ed7a673b.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7a278e40dd75d2b1f7a7b30d97350f579caa47efb7880348c89de450ed7a673b.exe
Resource
win10v2004-20240508-en
General
-
Target
7a278e40dd75d2b1f7a7b30d97350f579caa47efb7880348c89de450ed7a673b
-
Size
1.1MB
-
MD5
b01d130b975984cc126d535ec0a9ee88
-
SHA1
056d4e02df1bcc78ff0873971a337438a864612e
-
SHA256
7a278e40dd75d2b1f7a7b30d97350f579caa47efb7880348c89de450ed7a673b
-
SHA512
a9a3b954fa69b267569046669ec9b2c29862f11a391cd5af7ffed8139d3cc2b87db88f6368fbf88f01128b0b5d18cbc4aa5f08d91a25280dbca4451143a73778
-
SSDEEP
24576:2LlQR/6c64GStv1D8W/SthImwXlegTjno/81OL:4lkkPJWqTI5eqnoAO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a278e40dd75d2b1f7a7b30d97350f579caa47efb7880348c89de450ed7a673b
Files
-
7a278e40dd75d2b1f7a7b30d97350f579caa47efb7880348c89de450ed7a673b.exe windows:6 windows x64 arch:x64
e75344c6dda32c2cfdf37223fd904c39
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
WriteProcessMemory
SetPriorityClass
GetCurrentProcess
GetShortPathNameW
VirtualAlloc
GetModuleFileNameW
SetThreadPriority
ExpandEnvironmentStringsA
GetEnvironmentVariableW
WaitForSingleObject
lstrcatA
GetModuleHandleA
Sleep
GetCurrentThread
SizeofResource
LockResource
CloseHandle
LoadResource
FindResourceW
GetProcAddress
VirtualAllocEx
ExitProcess
CreateProcessW
GetModuleHandleW
lstrcpyW
WinExec
CreateRemoteThread
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetModuleFileNameA
GetShortPathNameA
lstrcatW
GetStartupInfoW
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
RtlCaptureContext
user32
MessageBoxA
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
shell32
ShellExecuteExW
SHChangeNotify
vcruntime140
__current_exception_context
__current_exception
memset
memcpy
__C_specific_handler
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
_seh_filter_exe
_set_app_type
_cexit
_register_thread_local_exe_atexit_callback
_c_exit
__p___argc
__p___argv
_exit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ