D:\DCB\CBT_Main\BuildResults\bin\Release\AcroCEF\RdrCEF.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c3c851a87dfeefddd807b9d1347d206fb1206e9be1ed9de0c342d06933cd0627.exe
Resource
win7-20240220-en
General
-
Target
c3c851a87dfeefddd807b9d1347d206fb1206e9be1ed9de0c342d06933cd0627
-
Size
7.4MB
-
MD5
aa7829bdfd0ed35c9876e78f6cc2ecd1
-
SHA1
2a147c5968ee175cd8ff96d70ebfad60f9e097a4
-
SHA256
c3c851a87dfeefddd807b9d1347d206fb1206e9be1ed9de0c342d06933cd0627
-
SHA512
07c55411a85c1d2aa47f7bd024f31d495b7b49bcdd8a84b6025fd3be634b953f01e6ce6107a5a31b81e9bdd08737c1aedecdb16c30e1959428f21077a5ae0566
-
SSDEEP
98304:iu1Gs6UyF5Sj9CAtlZHxhIHVruP3WpF3UdE1hZHEdkFx2WCl2/V0cETQ/I:KGBrDhgJuP32+dmhZkaMr+Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3c851a87dfeefddd807b9d1347d206fb1206e9be1ed9de0c342d06933cd0627
Files
-
c3c851a87dfeefddd807b9d1347d206fb1206e9be1ed9de0c342d06933cd0627.exe windows:6 windows x86 arch:x86
7919c2f06f2b8d1d63b9af30c10fcfcc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DuplicateHandle
GetFileType
SetHandleInformation
RegisterWaitForSingleObject
UnregisterWaitEx
AssignProcessToJobObject
WriteProcessMemory
CreateFileMappingW
MapViewOfFile
VirtualFree
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
CreateFileW
VirtualProtectEx
ReadProcessMemory
GetCurrentDirectoryW
GetModuleFileNameW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
LoadLibraryExW
LoadLibraryW
FreeLibrary
ReleaseSRWLockExclusive
VirtualFreeEx
CreateNamedPipeW
CreateProcessW
CreateRemoteThread
CreateJobObjectW
UnmapViewOfFile
FindResourceW
SizeofResource
LoadResource
LockResource
CreateDirectoryW
ReadFile
TlsGetValue
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
QueryThreadCycleTime
VirtualAlloc
SetThreadPriority
SearchPathW
lstrlenW
DebugBreak
GetModuleHandleExW
SetFilePointerEx
GetFileSizeEx
SetEndOfFile
FlushFileBuffers
FindClose
FindNextFileW
FindFirstFileExW
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
TlsAlloc
TlsFree
TlsSetValue
VirtualQuery
WideCharToMultiByte
K32QueryWorkingSetEx
SwitchToThread
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
GetThreadTimes
UnregisterWait
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
CreateTimerQueue
FreeLibraryAndExitThread
ExitThread
GetExitCodeThread
AreFileApisANSI
GetWindowsDirectoryW
DeviceIoControl
GetEnvironmentVariableW
TryEnterCriticalSection
CreateEventA
GetThreadId
RaiseException
IsDebuggerPresent
Sleep
ProcessIdToSessionId
GetCurrentProcessId
LocalFree
GetNativeSystemInfo
GetVersionExW
GetTickCount
EnumSystemLocalesEx
GetUserDefaultLocaleName
GetUserDefaultLCID
GetUserDefaultLangID
TerminateProcess
GetCurrentThreadId
SetInformationJobObject
DeleteCriticalSection
WaitForSingleObject
PostQueuedCompletionStatus
SetEvent
TerminateJobObject
LeaveCriticalSection
EnterCriticalSection
GetQueuedCompletionStatus
ResetEvent
SetLastError
CreateThread
CreateEventW
CreateIoCompletionPort
InitializeCriticalSection
VirtualAllocEx
VirtualQueryEx
GetCurrentThread
GetModuleHandleA
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
HeapCreate
GetSystemInfo
VerifyVersionInfoW
SetDllDirectoryW
GetProcAddress
GetModuleHandleW
GetCurrentProcess
CreateMutexW
ReleaseMutex
HeapSetInformation
GetProcessHeap
GetLastError
CloseHandle
GetCommandLineW
GetThreadPriority
CancelIoEx
DisconnectNamedPipe
ConnectNamedPipe
CancelSynchronousIo
GetProcessTimes
VerSetConditionMask
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
OutputDebugStringW
GetTimeZoneInformation
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
GetTimeFormatW
VirtualProtect
LoadLibraryExA
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
FormatMessageW
LocalAlloc
TerminateThread
CreateFileMappingA
MapViewOfFileEx
OpenFileMappingA
ExitProcess
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetStartupInfoW
InitializeSListHead
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetConsoleCP
GetConsoleMode
SetStdHandle
GetStdHandle
WriteConsoleW
GetDateFormatW
user32
CloseDesktop
CloseWindowStation
GetSystemMetrics
GetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
SetProcessWindowStation
GetUserObjectInformationW
CreateDesktopW
advapi32
GetUserNameW
EventWrite
EventUnregister
EventRegister
GetSidSubAuthorityCount
SetEntriesInAclW
GetSecurityInfo
GetSidSubAuthority
InitializeSid
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
DuplicateToken
CreateRestrictedToken
RegQueryValueExW
RegCreateKeyExW
SetThreadToken
GetTokenInformation
CreateProcessAsUserW
AccessCheck
EqualSid
IsValidSid
GetNamedSecurityInfoW
MapGenericMask
ImpersonateLoggedOnUser
FreeSid
SystemFunction036
ConvertSidToStringSidW
DuplicateTokenEx
GetKernelObjectSecurity
SetKernelObjectSecurity
GetAce
OpenProcessToken
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExW
RegDisablePredefinedCache
RevertToSelf
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
shell32
CommandLineToArgvW
SHGetKnownFolderPath
SHGetFolderPathW
ole32
CoTaskMemFree
Exports
Exports
GetHandleVerifier
IsSandboxedProcess
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 414KB - Virtual size: 414KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 672KB - Virtual size: 676KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE