D:\code3\rel\PDFRunningHelper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c2a58d9a851a0f217ef5f188956be4b9ee2806a251569d76463163ee5dd7cc78.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c2a58d9a851a0f217ef5f188956be4b9ee2806a251569d76463163ee5dd7cc78.exe
Resource
win10v2004-20240611-en
General
-
Target
c2a58d9a851a0f217ef5f188956be4b9ee2806a251569d76463163ee5dd7cc78
-
Size
874KB
-
MD5
464424ee71b0952f4f85a9a859c0501d
-
SHA1
88fefc95bc1f19b610f369f188d28172cb79cf70
-
SHA256
c2a58d9a851a0f217ef5f188956be4b9ee2806a251569d76463163ee5dd7cc78
-
SHA512
3fa448c8aceaad701a924ead836ab3d30c35d9686e253f511051c2089f1c3fd9b1c44a8bea08617bdca6185f2f88d124f6bef161b067100cf4a6ad778cf3ba1f
-
SSDEEP
12288:8BSV6lJKbxVP/gFUa4C4rpd6PGv/SSBbMvK0orBVTsAPZ37G5BacWlKzKPW:8kV6lJQx1a9iJ5BQS0kTNPZC+KzKP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2a58d9a851a0f217ef5f188956be4b9ee2806a251569d76463163ee5dd7cc78
Files
-
c2a58d9a851a0f217ef5f188956be4b9ee2806a251569d76463163ee5dd7cc78.exe windows:5 windows x86 arch:x86
64289dc8b7d3176c5ada29ae74a06988
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetThreadLocale
SetThreadLocale
GetWindowsDirectoryW
SetUnhandledExceptionFilter
GetLocalTime
IsBadReadPtr
VirtualProtect
ExitProcess
InitializeCriticalSection
MapViewOfFile
UnmapViewOfFile
OpenEventW
OpenFileMappingW
SetEndOfFile
RemoveDirectoryW
GetLongPathNameW
DeviceIoControl
lstrcmpA
LocalFree
GetFileTime
GetFileSize
DeleteFileW
Sleep
TerminateProcess
DecodePointer
GetCommandLineW
LoadLibraryExW
lstrcmpiW
FreeLibrary
GetCurrentProcess
GetProcAddress
GetModuleHandleW
WideCharToMultiByte
ReadFile
CreateProcessW
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
GetStartupInfoW
GetTimeZoneInformation
GetConsoleCP
SetStdHandle
ReadConsoleW
GetConsoleMode
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetACP
GetStdHandle
GetModuleHandleExW
ExitThread
FindFirstFileExW
RtlUnwind
SystemTimeToFileTime
FreeLibraryAndExitThread
GetThreadTimes
UnhandledExceptionFilter
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
GetSystemTime
GetComputerNameW
GetQueuedCompletionStatus
InterlockedExchange
CreateIoCompletionPort
CreateEventW
TerminateThread
GetExitCodeThread
GetSystemInfo
PostQueuedCompletionStatus
SetEvent
ResetEvent
GetNativeSystemInfo
MoveFileExW
SetFileAttributesW
lstrlenA
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FindClose
FindNextFileW
FindFirstFileW
lstrlenW
GetFileAttributesExW
GetVersionExW
WaitForSingleObject
LoadLibraryW
GetVersion
CreatePipe
SetProcessShutdownParameters
WriteFile
OutputDebugStringW
CloseHandle
SetFilePointer
CreateFileW
MultiByteToWideChar
SetLastError
RaiseException
GetCurrentThreadId
GetPrivateProfileStringW
GetTickCount
WritePrivateProfileStringW
GetPrivateProfileIntW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
InitializeCriticalSectionAndSpinCount
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
GetModuleFileNameW
TlsAlloc
QueryPerformanceCounter
GetCPInfo
WaitForSingleObjectEx
GetStringTypeW
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
FlushFileBuffers
GetCurrentThread
CreateThread
FormatMessageW
GetCurrentProcessId
OpenProcess
GetLastError
user32
SendMessageW
wsprintfW
UnregisterClassW
RegisterClassExW
GetClassInfoExW
LoadCursorW
CreateWindowExW
SetWindowLongW
GetWindowLongW
CallWindowProcW
ShowWindow
CharNextW
FindWindowW
PostMessageW
DispatchMessageW
DestroyWindow
GetMessageW
PeekMessageW
TranslateMessage
PostQuitMessage
DefWindowProcW
CharLowerBuffW
KillTimer
SetTimer
MessageBoxW
IsWindow
advapi32
RegEnumKeyExW
ConvertSidToStringSidW
LookupAccountNameW
GetUserNameW
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
RegEnumKeyW
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
CloseServiceHandle
CreateServiceW
OpenSCManagerW
shell32
ShellExecuteExW
SHChangeNotify
SHGetFolderPathW
SHGetMalloc
SHGetSpecialFolderPathW
ShellExecuteW
SHCreateDirectoryExW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ord165
ole32
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoInitialize
CLSIDFromProgID
OleRun
CoUninitialize
CoInitializeSecurity
CoTaskMemFree
oleaut32
VariantCopy
GetErrorInfo
VariantInit
SysStringByteLen
SysAllocStringByteLen
VariantClear
LoadTypeLi
SysStringLen
SysFreeString
LoadRegTypeLi
VarUI4FromStr
SysAllocString
SysAllocStringLen
VarBstrCmp
shlwapi
StrStrIW
PathSearchAndQualifyW
SHDeleteValueW
SHSetValueW
SHDeleteKeyW
SHGetValueW
AssocQueryStringW
PathIsDirectoryW
PathCanonicalizeW
PathRemoveBackslashW
PathIsPrefixW
PathFindExtensionW
PathCombineW
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
PathFindFileNameW
PathRemoveExtensionW
wininet
InternetConnectW
InternetSetOptionW
InternetOpenW
InternetCrackUrlW
HttpQueryInfoW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
InternetReadFile
gdiplus
GdiplusStartup
crypt32
CryptBinaryToStringW
CryptStringToBinaryW
netapi32
Netbios
psapi
EnumProcessModules
iphlpapi
GetAdaptersInfo
GetIpAddrTable
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
secur32
GetUserNameExW
Sections
.text Size: 524KB - Virtual size: 524KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ