E:\updater\build\vc14-x86-release\bin\dropper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
286f4506964fbbafd3a0a3af83a80c56912642cfa6fa439b9bedabc5f1c27d45.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
286f4506964fbbafd3a0a3af83a80c56912642cfa6fa439b9bedabc5f1c27d45.exe
Resource
win10v2004-20240611-en
General
-
Target
286f4506964fbbafd3a0a3af83a80c56912642cfa6fa439b9bedabc5f1c27d45
-
Size
2.7MB
-
MD5
b052789c6634327cc216da0f973c943d
-
SHA1
99fdfe46a916073909fac0f7f1cbc9ab94b23041
-
SHA256
286f4506964fbbafd3a0a3af83a80c56912642cfa6fa439b9bedabc5f1c27d45
-
SHA512
6780637fe258e41eb9b9eff2549ba6ef455dfe6f2246ad52d02fb799cffde33a1003cb752f1629b96a54e40823f0c6d9b49f2590c86bb1fca956f30d551479b5
-
SSDEEP
49152:WYezuFO6LTdmInhMKI7CLum3huQhP8Tk+o2xPPRTlC1QwKGrXEoKoGADDFR9er+:WYeeowhuwUho2xPPRTAIGrZTDZa+TL3w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 286f4506964fbbafd3a0a3af83a80c56912642cfa6fa439b9bedabc5f1c27d45
Files
-
286f4506964fbbafd3a0a3af83a80c56912642cfa6fa439b9bedabc5f1c27d45.exe windows:5 windows x86 arch:x86
6ae1ffc6b9c11b5f08d8fb21b2505d36
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
WSAStartup
WSACleanup
kernel32
ExitProcess
GetModuleHandleExW
RtlUnwind
CloseHandle
GetStartupInfoW
GetLastError
FormatMessageA
LocalFree
MultiByteToWideChar
GetTickCount
Sleep
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
DeleteCriticalSection
CreateEventA
SetEvent
ResetEvent
WaitForSingleObject
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetTempPathW
EnterCriticalSection
GetCurrentProcess
LeaveCriticalSection
InitializeCriticalSection
GetSystemInfo
VirtualAllocEx
VirtualFreeEx
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
HeapAlloc
TlsSetValue
TlsGetValue
GetSystemTimeAsFileTime
TlsFree
TlsAlloc
CreateEventW
WideCharToMultiByte
WaitForSingleObjectEx
GetCurrentProcessId
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindNextFileW
GetFileAttributesW
RemoveDirectoryW
SetEndOfFile
SetFilePointerEx
DeviceIoControl
LCMapStringW
AreFileApisANSI
HeapReAlloc
HeapFree
GetStdHandle
WriteFile
GetACP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
GetFileType
GetProcessHeap
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
WriteConsoleW
ReadConsoleW
SetLastError
GetStringTypeW
GetCurrentThread
GetCurrentThreadId
QueryPerformanceCounter
EncodePointer
CompareStringW
GetLocaleInfoW
GetCPInfo
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
OutputDebugStringW
GetThreadTimes
FreeLibrary
LoadLibraryExW
user32
MessageBoxA
shell32
SHGetFolderPathW
ole32
CoTaskMemFree
CLSIDFromString
advapi32
CryptImportKey
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptEncrypt
CryptDestroyKey
CryptDecrypt
CryptSetKeyParam
CryptReleaseContext
CryptAcquireContextW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyExA
RegQueryValueExA
StartServiceW
ChangeServiceConfig2W
CreateServiceW
QueryServiceStatusEx
CloseServiceHandle
OpenServiceW
OpenSCManagerW
SystemFunction036
Exports
Exports
??0VMemMgr@asmjit@@QAE@PAX@Z
??1VMemMgr@asmjit@@QAE@XZ
??_FVMemMgr@asmjit@@QAEXXZ
?alloc@VMemMgr@asmjit@@QAEPAXII@Z
?alloc@VMemUtil@asmjit@@SAPAXIPAII@Z
?allocProcessMemory@VMemUtil@asmjit@@SAPAXPAXIPAII@Z
?getPageGranularity@VMemUtil@asmjit@@SAIXZ
?getPageSize@VMemUtil@asmjit@@SAIXZ
?release@VMemMgr@asmjit@@QAEIPAX@Z
?release@VMemUtil@asmjit@@SAIPAXI@Z
?releaseProcessMemory@VMemUtil@asmjit@@SAIPAX0I@Z
?reset@VMemMgr@asmjit@@QAEXXZ
?shrink@VMemMgr@asmjit@@QAEIPAXI@Z
?x86RegData@asmjit@@3UX86RegData@1@B
Sections
.text Size: 462KB - Virtual size: 462KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.resinj Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ