C:\b\c\b\win_archive\src\out\Release\initialexe\chrome.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c33acbe603267677e37ff5609df3944efd176f62289f15ed07004be15b0e23d3.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c33acbe603267677e37ff5609df3944efd176f62289f15ed07004be15b0e23d3.exe
Resource
win10v2004-20240508-en
General
-
Target
c33acbe603267677e37ff5609df3944efd176f62289f15ed07004be15b0e23d3
-
Size
2.5MB
-
MD5
be1a8d2bfa261cac7ebf7157a6318aeb
-
SHA1
e4885b549fa432cf3ef80ca883dc0f7010db53c8
-
SHA256
c33acbe603267677e37ff5609df3944efd176f62289f15ed07004be15b0e23d3
-
SHA512
a4e207797e8ac51ff5bc1f2ef895d5bd9acea2ea005130a9cd0a33137dc94d0522537a1c17a978f3d1ca719969cce8670f39c461d99a016212b9eaba5c629bb0
-
SSDEEP
49152:/8QiPxmxcjy5KrtzHH4uN4LrNxkW+LUwbohSO4I04NgnLr23X9r9kRQw5:kQSw+jy5szHHyBrQohSO4IInLC39GRp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c33acbe603267677e37ff5609df3944efd176f62289f15ed07004be15b0e23d3
Files
-
c33acbe603267677e37ff5609df3944efd176f62289f15ed07004be15b0e23d3.exe windows:5 windows x86 arch:x86
b59b446802c654c4c381e47b25de3448
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
chrome_elf
SignalChromeElf
advapi32
ImpersonateNamedPipeClient
GetUserNameW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
SystemFunction036
OpenProcessToken
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
GetTokenInformation
LookupPrivilegeValueW
CreateProcessAsUserW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
gdi32
DeleteObject
EnumFontFamiliesExW
GetCharABCWidthsW
GetFontData
GetGlyphOutlineW
GetOutlineTextMetricsW
GetFontUnicodeRanges
GetGlyphIndicesW
GetTextExtentPointI
AddFontMemResourceEx
RemoveFontMemResourceEx
SelectObject
SetBkMode
SetGraphicsMode
SetTextColor
SetTextAlign
GetTextMetricsW
SetWorldTransform
CreateDIBSection
ExtTextOutW
GetTextFaceW
GdiFlush
CreateFontIndirectW
CreateCompatibleDC
DeleteDC
kernel32
GetCurrentThreadId
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetProcessId
SetCurrentDirectoryW
SetProcessShutdownParameters
LoadLibraryExW
VirtualAlloc
VirtualFree
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapReAlloc
HeapFree
GetComputerNameExW
ExitProcess
GetCurrentDirectoryW
CreateFileW
DeleteFileW
WriteFile
OutputDebugStringA
CloseHandle
GetCurrentProcessId
GetTickCount
GetModuleFileNameW
FormatMessageA
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetCurrentThread
SetThreadPriority
GetThreadPriority
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineW
LocalFree
ExpandEnvironmentStringsW
GetVersionExW
GetNativeSystemInfo
TerminateProcess
GetExitCodeProcess
OpenProcess
FlushFileBuffers
GetFileInformationByHandle
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointerEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
IsDebuggerPresent
RaiseException
CreateThread
GetProcessTimes
GetSystemInfo
VirtualQueryEx
VirtualQuery
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
CreateDirectoryW
GetFileAttributesW
QueryDosDeviceW
GetTempPathW
UnregisterWaitEx
RegisterWaitForSingleObject
GetUserDefaultLangID
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetThreadId
CreateEventW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
SetEvent
SetInformationJobObject
LoadLibraryW
FindClose
FindFirstFileExW
FindNextFileW
LoadResource
LockResource
SizeofResource
FindResourceW
ResetEvent
CompareStringW
DecodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
SuspendThread
ResumeThread
GetThreadContext
ReadProcessMemory
IsProcessorFeaturePresent
GetTimeZoneInformation
GetThreadLocale
GetSystemDefaultLCID
GetUserDefaultLCID
HeapSetInformation
VirtualAllocEx
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateJobObject
WriteProcessMemory
AssignProcessToJobObject
FreeLibrary
GetFileType
SetHandleInformation
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualProtectEx
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
CreateRemoteThread
CreateProcessW
DebugBreak
lstrlenW
SearchPathW
ReleaseSemaphore
CreateSemaphoreW
VirtualProtect
LoadLibraryExA
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GetVersion
DisconnectNamedPipe
ConnectNamedPipe
UnlockFileEx
LockFileEx
GetUserDefaultUILanguage
GetEnvironmentVariableW
HeapSize
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetStdHandle
GetACP
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
PeekNamedPipe
GetDriveTypeW
GetProcessHeap
RtlUnwind
OutputDebugStringW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
InitializeSListHead
GetStartupInfoW
UnhandledExceptionFilter
SetLastError
GetLastError
GetProcAddress
GetModuleHandleA
GetModuleHandleExW
GetLongPathNameW
shell32
SHGetFolderPathW
SHGetKnownFolderPath
CommandLineToArgvW
SHGetSpecialFolderPathW
user32
FindWindowExW
SystemParametersInfoW
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
CloseDesktop
GetWindowThreadProcessId
AllowSetForegroundWindow
SendMessageTimeoutW
IsWindow
usp10
ScriptItemize
ScriptFreeCache
ScriptShape
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
winmm
timeGetTime
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
rpcrt4
UuidCreate
winhttp
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpOpen
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpSetTimeouts
WinHttpOpenRequest
Exports
Exports
GetHandleVerifier
IsSandboxedProcess
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 409KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 836B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ