C:\BUILD\work\e0dd96435fde7cb0\BUILDS\Release\x86\avDump.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Information.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Payment_Information.exe
Resource
win10v2004-20240508-en
General
-
Target
01072024_1044_Payment_Information.zip
-
Size
594KB
-
MD5
50c4962e4715ff425067203256b8b608
-
SHA1
f86e40e6b004b9b450964696e78fb2e76ff0f6a6
-
SHA256
0d23152df158541a195e57e5e6f1027728349e8e813f002d46a0c6950a90c688
-
SHA512
b4941a7e47799cf8d6826965ee696e52520b99bebd8a0eddee1cfec237a852a31716d982cec915fe4cf6b0dbc5d0de5a1398d2933fa8e52df64ec2d004688581
-
SSDEEP
12288:PnE1xrHxZjWL+g9fAFi7fHLSboIgPQbOmrBQAe8lDNa1TaZY:PE11R0LvfAFiYNgkOJC41T3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Payment_Information.exe
Files
-
01072024_1044_Payment_Information.zip.zip
Password: infected
-
Payment_Information.exe.exe windows:6 windows x86 arch:x86
Password: infected
a47df833e1ff03fafaabeffce7c63cca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
rpcrt4
RpcServerUseProtseqEpW
NdrClientCall2
RpcStringFreeW
RpcServerUnregisterIf
I_RpcBindingInqLocalClientPID
NdrServerCall2
RpcServerRegisterIfEx
RpcBindingFromStringBindingW
RpcStringBindingComposeW
shell32
SHGetFolderPathW
ntdll
VerSetConditionMask
NtSystemDebugControl
RtlNtStatusToDosError
NtClose
NtQueryKey
NtDeleteKey
NtOpenKey
RtlUnwind
kernel32
SetLastError
GetModuleHandleExW
GetCurrentThreadId
Sleep
LocalFree
SetFilePointerEx
UnlockFileEx
LockFileEx
GetFileSizeEx
ReadFile
CompareStringW
GetCurrentThread
WriteFile
InitializeCriticalSectionEx
FlushFileBuffers
GetFileInformationByHandle
GetFullPathNameW
OutputDebugStringA
FileTimeToSystemTime
GetCurrentProcessId
TlsAlloc
TlsGetValue
TlsSetValue
FreeLibrary
GetSystemInfo
QueryPerformanceFrequency
QueryPerformanceCounter
ExpandEnvironmentStringsW
GetFileAttributesW
LoadLibraryExW
GetWindowsDirectoryW
GetSystemDirectoryW
HeapFree
VirtualProtect
HeapReAlloc
GlobalMemoryStatusEx
GetExitCodeThread
TlsFree
MoveFileExW
FindClose
CreateDirectoryW
FindFirstFileExW
FindNextFileW
QueryDosDeviceW
WriteConsoleW
SetFileInformationByHandle
GetDiskFreeSpaceExW
K32GetMappedFileNameW
FindFirstVolumeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
VirtualQuery
GetSystemTimes
GetTickCount64
RaiseException
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCPInfo
GetProcessHeap
HeapAlloc
GetModuleFileNameW
SetConsoleCtrlHandler
SetDllDirectoryW
WaitForSingleObject
GetProcessId
GetNamedPipeServerProcessId
GetFileTime
MultiByteToWideChar
ContinueDebugEvent
DebugActiveProcessStop
GetFileAttributesExW
GetSystemTimeAsFileTime
ReadProcessMemory
OpenThread
DebugBreakProcess
SetEvent
WaitForDebugEvent
DebugSetProcessKillOnExit
DebugActiveProcess
WideCharToMultiByte
VirtualQueryEx
GetThreadContext
K32GetProcessImageFileNameW
K32GetModuleBaseNameW
K32EnumProcessModules
WaitForMultipleObjects
CreateEventW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DeleteFileW
VerifyVersionInfoW
K32GetPerformanceInfo
DeviceIoControl
CreateFileW
GetLastError
CloseHandle
OpenProcess
GetProcAddress
GetModuleHandleW
GetCurrentProcess
TerminateProcess
SetUnhandledExceptionFilter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
InterlockedPushEntrySList
InitializeCriticalSectionAndSpinCount
CreateThread
ExitThread
FreeLibraryAndExitThread
GetStdHandle
GetCommandLineA
GetCommandLineW
ExitProcess
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleOutputCP
GetConsoleMode
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
ReadConsoleW
HeapSize
GetEnvironmentVariableW
DecodePointer
EncodePointer
LCMapStringEx
GetLocaleInfoEx
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
SleepConditionVariableSRW
WakeAllConditionVariable
LoadLibraryExA
GetStringTypeW
WaitForSingleObjectEx
FormatMessageA
WakeConditionVariable
user32
RegisterClassExW
GetClassInfoExW
advapi32
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
RegDeleteTreeW
RegQueryInfoKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
StartServiceW
QueryServiceStatus
RevertToSelf
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
CloseServiceHandle
ControlService
ChangeServiceConfigW
CreateServiceW
DeleteService
OpenServiceW
OpenSCManagerW
StartServiceCtrlDispatcherW
ChangeServiceConfig2W
QueryServiceConfig2W
RegisterServiceCtrlHandlerExW
SetServiceStatus
SetThreadToken
Exports
Exports
asw_process_storage_allocate_connector
asw_process_storage_deallocate_connector
on_avast_dll_unload
onexit_register_connector_avast_2
Sections
.text Size: 647KB - Virtual size: 646KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 266KB - Virtual size: 266KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ