D:\work\Windows\Release\Windows.pdb
Static task
static1
Behavioral task
behavioral1
Sample
52cbd62f6d78b14b2d0cd7d49d1cfd782ec01a65802dc94703d34ce403970c5f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
52cbd62f6d78b14b2d0cd7d49d1cfd782ec01a65802dc94703d34ce403970c5f.exe
Resource
win10v2004-20240508-en
General
-
Target
52cbd62f6d78b14b2d0cd7d49d1cfd782ec01a65802dc94703d34ce403970c5f
-
Size
5.3MB
-
MD5
4f083e8a56bccb4af0673cb16d1f8daa
-
SHA1
fc994d49866a80dbd1258c77f11ccef74d16ff22
-
SHA256
52cbd62f6d78b14b2d0cd7d49d1cfd782ec01a65802dc94703d34ce403970c5f
-
SHA512
040b16abcaf61156a3f84f25ac8e67211da0e46dc38a2e44e697985be306912ea94d85d2db9540af88aa5b63bcb33750895f21de0a3dfb41c8c1f4920fdc2d5d
-
SSDEEP
98304:hY7L0maQx5pBzi0aLbPysSWSN5qDi1wAjqqxzcJqYc9GfW:yBaQxRi06PysSZ1lnxzcJPW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52cbd62f6d78b14b2d0cd7d49d1cfd782ec01a65802dc94703d34ce403970c5f
Files
-
52cbd62f6d78b14b2d0cd7d49d1cfd782ec01a65802dc94703d34ce403970c5f.exe windows:5 windows x86 arch:x86
c57aafa448bf5fa8fb10cb91c9837646
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
RaiseException
LoadLibraryW
CreateThread
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
GetProcAddress
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
FreeLibrary
CopyFileW
GetTickCount
ReadFile
WaitForSingleObject
GetLocalTime
GetCurrentProcessId
SystemTimeToFileTime
WideCharToMultiByte
WritePrivateProfileStringW
OutputDebugStringA
GetTempPathW
GetTempPathA
OutputDebugStringW
WritePrivateProfileStringA
SetFileAttributesA
CreateDirectoryW
GetSystemTime
FindFirstFileA
GetCurrentProcess
WriteFile
CloseHandle
GetProcessId
FindNextFileA
GetSystemDirectoryW
CreateFileA
GetSystemDirectoryA
GetSystemInfo
CreateDirectoryA
GetExitCodeProcess
HeapReAlloc
DeleteFileW
DeleteFileA
LockResource
LoadLibraryA
GetLastError
Sleep
MultiByteToWideChar
SetFileAttributesW
HeapSize
GetModuleHandleA
CreateFileW
FindClose
InitializeCriticalSectionAndSpinCount
RemoveDirectoryW
DeviceIoControl
FindNextFileW
HeapFree
SetEndOfFile
WriteConsoleW
GetFullPathNameW
GetCurrentDirectoryW
FlushFileBuffers
GetTimeZoneInformation
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FindFirstFileW
GetModuleFileNameW
SizeofResource
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
SetLastError
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
InitializeCriticalSection
SleepEx
FormatMessageA
WaitForMultipleObjects
GetFileType
GetStdHandle
PeekNamedPipe
ExpandEnvironmentStringsA
VerSetConditionMask
VerifyVersionInfoA
RtlUnwind
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetACP
ExitThread
FreeLibraryAndExitThread
SetFilePointerEx
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetConsoleMode
ReadConsoleW
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
PostMessageW
MessageBoxA
ExitWindowsEx
FindWindowA
advapi32
RegCloseKey
CryptImportKey
CryptAcquireContextA
CryptDestroyKey
RegFlushKey
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegEnumValueW
RegQueryValueExW
CryptEncrypt
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
ShellExecuteExW
SHGetFolderPathW
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
shlwapi
PathFileExistsW
PathFileExistsA
ws2_32
freeaddrinfo
accept
listen
gethostname
ioctlsocket
sendto
htons
WSAEnumNetworkEvents
recvfrom
WSAWaitForMultipleEvents
ntohs
socket
WSAEventSelect
inet_addr
WSAStartup
WSACreateEvent
ntohl
WSACleanup
getaddrinfo
WSAGetLastError
__WSAFDIsSet
select
WSASetLastError
recv
send
bind
closesocket
connect
getpeername
getsockname
getsockopt
setsockopt
WSAIoctl
iphlpapi
GetAdaptersInfo
GetAdaptersAddresses
wldap32
ord33
ord35
ord79
ord50
ord143
ord30
ord41
ord22
ord200
ord301
ord46
ord60
ord26
ord27
ord211
ord32
Exports
Exports
FreeListMem
Sections
.text Size: - Virtual size: 594KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dwl0 Size: - Virtual size: 622KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dwl1 Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ