c:\source\source.ACL\86254\Release_wdexe_12\WX\Win32\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f50e7e7ed484a30f7eb151305380114c47d71e0a7c8719b221f7ca38c57ffd8f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f50e7e7ed484a30f7eb151305380114c47d71e0a7c8719b221f7ca38c57ffd8f.exe
Resource
win10v2004-20240611-en
General
-
Target
f50e7e7ed484a30f7eb151305380114c47d71e0a7c8719b221f7ca38c57ffd8f
-
Size
3.1MB
-
MD5
d0ac810a582dbccb29bbb2a23e5e5064
-
SHA1
3ee8e8ab18de5a9f52e5770006bdb0a79e66ff52
-
SHA256
f50e7e7ed484a30f7eb151305380114c47d71e0a7c8719b221f7ca38c57ffd8f
-
SHA512
5c150be1be1f86eac355cf455d6958dba5dbc4fcbcff8dd5cd9c6da25e929912964f604c1a98bc6b8a464da651e1cbb000b1b9883535b8f21185bb0fd213a4dd
-
SSDEEP
49152:6vVoh9ph1zA2Mr81j84MVVoh9ph1HH6FBklHxMf7d:cuJ1k2M94MVuJ1HaTklHxMfp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f50e7e7ed484a30f7eb151305380114c47d71e0a7c8719b221f7ca38c57ffd8f
Files
-
f50e7e7ed484a30f7eb151305380114c47d71e0a7c8719b221f7ca38c57ffd8f.exe windows:4 windows x86 arch:x86
3d8f2f97d54fbb902659375438231cd3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
_except_handler3
_onexit
__dllonexit
_lfind
vsprintf
vswprintf
iswspace
_stricmp
memcmp
realloc
towupper
wcspbrk
_wmakepath
_wstati64
memmove
wcscmp
wcsncmp
atoi
_wcsnicmp
swprintf
_wtoi
wcsstr
_wcsupr
strchr
strlen
strcat
wcschr
_vsnprintf
_vsnwprintf
_purecall
strncmp
_wcsicmp
memcpy
gmtime
time
free
malloc
memset
??2@YAPAXI@Z
wcscpy
??3@YAXPAX@Z
wcsrchr
wcslen
wcsncpy
wcscat
__CxxFrameHandler
kernel32
WaitForSingleObject
RaiseException
CreateProcessW
CreateMailslotW
ExpandEnvironmentStringsW
GetComputerNameW
GetMailslotInfo
GetSystemDefaultLangID
GetExitCodeProcess
GetProfileStringW
CreateThread
TerminateThread
ResumeThread
InterlockedExchange
ReleaseSemaphore
CreateSemaphoreW
LoadLibraryA
GetTimeZoneInformation
WideCharToMultiByte
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetCurrentThreadId
TlsFree
TlsAlloc
VirtualProtect
VirtualQuery
TlsGetValue
TlsSetValue
GetDriveTypeW
GetFullPathNameW
FindNextFileW
FindFirstFileExW
SetFileAttributesW
GetFileAttributesW
FindClose
FindFirstFileW
CreateDirectoryW
CopyFileW
MoveFileW
DeleteFileW
Sleep
GetTickCount
CreateFileW
FileTimeToSystemTime
SystemTimeToFileTime
SetLastError
SetErrorMode
SetEndOfFile
FlushFileBuffers
UnlockFileEx
UnlockFile
LockFileEx
LockFile
SetFilePointer
ReadFile
WriteFile
GetVolumeInformationW
GetLogicalDriveStringsW
GetFileInformationByHandle
LoadLibraryW
GetVersionExW
LocalAlloc
InterlockedExchangeAdd
GetLocalTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ExitProcess
GetCommandLineW
LocalFree
GetModuleFileNameW
GetLastError
CreateFileMappingW
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
CreateEventW
GetStartupInfoW
MulDiv
SetEvent
CreateMutexW
ReleaseMutex
OpenFileMappingW
FreeLibrary
FindResourceW
LoadResource
LockResource
FreeResource
GetTempPathW
GetTempFileNameW
GetCurrentProcessId
SizeofResource
InterlockedIncrement
InterlockedDecrement
FormatMessageW
Exports
Exports
CommandeComposante
DeclareProxy
Execution
LibereMutex
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ