E:\PB_Backup_All\2012_12_20\PointBlank\Source_New\ClientSource\Distribute_Turkey\PBConfig.pdb
Static task
static1
Behavioral task
behavioral1
Sample
06783f397281ec3c7fec239e70538722cfa8c99e274974173e56b4d2c510bf28.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
06783f397281ec3c7fec239e70538722cfa8c99e274974173e56b4d2c510bf28.exe
Resource
win10v2004-20240611-en
General
-
Target
06783f397281ec3c7fec239e70538722cfa8c99e274974173e56b4d2c510bf28.exe
-
Size
351KB
-
MD5
60ac19c1674491494f8522ee60655170
-
SHA1
99d8bce1babc1b22d60626531a5baf0b462dd1f8
-
SHA256
06783f397281ec3c7fec239e70538722cfa8c99e274974173e56b4d2c510bf28
-
SHA512
b964b110931806759262624a43e8c5ac85f93fcc329fbaefe6d38c33f8a7f534cc1e0655efc481cbd453bc1017c58ab4afab81086d1285465382cf2c4319fa94
-
SSDEEP
6144:3yYt/9HjK1Wzj09IqN/ZeJNp0fMdmaIA8PB6SwIc1KL4n/O5wb:3HXzj0iT0fMdmaIDBgnY4IU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06783f397281ec3c7fec239e70538722cfa8c99e274974173e56b4d2c510bf28.exe
Files
-
06783f397281ec3c7fec239e70538722cfa8c99e274974173e56b4d2c510bf28.exe.exe windows:5 windows x86 arch:x86
f8b3ad8dc6ec0e7d604d62cfbb21dbf3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
i3basedx_cli
?i3MemoryInit@@YAXIPAD@Z
?Format@i3String@@YAXPADHPBDZZ
?FreeTool@i3mem@@YAXPAXPBDH@Z
?SetEnv@i3Error@@YAXPBDH0W4I3LOG_TYPE@@@Z
?AllocTool@i3mem@@YAPAXHHHPBDH@Z
?Release@i3ElementBase@@QAEXXZ
?Log@i3Error@@YAXABV?$literal_base_range@PBD@i3@@@Z
?deallocate@pool_by_thread@i3@@QAEXPAX@Z
?resize_slot@detail_tls@i3@@YAXPAUthread_data@12@I@Z
?g_TlsManager@detail_tls@i3@@3Vtls_mgr@12@A
??0pool_by_thread@i3@@QAE@XZ
??1noncopyable@i3@@IAE@XZ
??0noncopyable@i3@@IAE@XZ
?allocate@pool_by_thread@i3@@QAEPAXI@Z
?get_global_item_list_with_tag@detail_sprintf@i3@@YAAAV?$vector@PAU?$sprint_item@D@detail_sprintf@i3@@V?$pool_allocator@PAU?$sprint_item@D@detail_sprintf@i3@@@3@@2@Uchar_item_tag@12@@Z
?on_create@?$shared_tls@Vpool_by_thread@i3@@@i3@@AAEXPAV?$tls_ptr@Vpool_by_thread@i3@@@2@K@Z
?delayed_atexit@i3@@YAHP6AXXZ@Z
?g_inst_memory_mgr@detail_inst@i3@@3Vinst_memory_mgr@12@A
?obtain_tls_idx@tls_mgr@detail_tls@i3@@QAEKXZ
?return_tls_idx@tls_mgr@detail_tls@i3@@QAEXK@Z
?tls_aligned_free@i3@@YAXKPAX@Z
?get_num_tls_thread_id@i3@@YAKXZ
??1pool_by_thread@i3@@QAE@XZ
?i3BaseRegisterMetas@@YAXXZ
i3mathdx
?i3MathRegisterMetas@@YAXXZ
i3gfxdx
?i3GfxRegisterMetas@@YAXXZ
?getDisplayMode@i3RenderContext@@SAXHW4I3G_IMAGE_FORMAT@@PAUI3G_DISPLAY_MODE_INFO@@@Z
?getDisplayModeCount@i3RenderContext@@SAHW4I3G_IMAGE_FORMAT@@@Z
??1i3VideoInfo@@UAE@XZ
?Create@i3RenderContext@@QAE_NPAVi3VideoInfo@@PAX@Z
??0i3VideoInfo@@QAE@XZ
?new_object_fun@i3RenderContext@@SAPAV1@XZ
?getISSVersion@i3ShaderCache@@QAEIXZ
?Load@i3ShaderCache@@SAPAV1@PBD@Z
i3scenedx
?LoadRegistrySet@i3RegistrySet@@QAEIPBDW4REGISTRY_FILE_TYPE@@@Z
?AddData@i3RegKey@@QAEXPBDH@Z
?SaveRegistrySet@i3RegistrySet@@QAEIPBDW4REGISTRY_FILE_TYPE@@@Z
?new_object_fun@i3RegistrySet@@SAPAV1@XZ
?getRoot@i3RegistrySet@@QAEPAVi3RegKey@@XZ
?GetData@i3RegKey@@QAE_NPBDPAH@Z
?GetData@i3RegKey@@QAE_NPBDPAM@Z
?i3SceneRegisterMetas@@YAXXZ
?AddData@i3RegKey@@QAEXPBDM@Z
kernel32
GlobalFlags
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GetThreadLocale
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
CreateFileA
GetCPInfo
GetOEMCP
GetModuleHandleW
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetTickCount
RtlUnwind
GetCommandLineA
GetStartupInfoA
Sleep
ExitProcess
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
FormatMessageA
LocalFree
InterlockedDecrement
GetModuleFileNameW
MulDiv
GlobalGetAtomNameA
GlobalFindAtomA
LoadLibraryA
MultiByteToWideChar
lstrcmpW
GetVersionExA
lstrlenA
WritePrivateProfileStringA
GlobalUnlock
GlobalFree
FreeResource
GetCurrentProcessId
GetLastError
SetLastError
GlobalAddAtomA
CloseHandle
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
LoadLibraryExA
WideCharToMultiByte
CompareStringA
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetModuleHandleA
GetProcAddress
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapFree
HeapAlloc
TlsGetValue
CopyFileA
FindClose
user32
IsDialogMessageA
SetWindowTextA
MoveWindow
ShowWindow
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
SetCapture
LoadCursorA
ReleaseCapture
GetSysColorBrush
CharUpperA
CharNextA
CopyAcceleratorTableA
IsRectEmpty
SetRect
InvalidateRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
DestroyMenu
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
SetMenu
SetForegroundWindow
UpdateWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostMessageA
PostQuitMessage
LoadIconA
EnableWindow
GetClientRect
IsIconic
SendMessageA
DrawIcon
GetSystemMetrics
MapWindowPoints
IsWindow
gdi32
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetDeviceCaps
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
SetMapMode
ScaleViewportExtEx
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
comctl32
ord17
shlwapi
PathIsUNCA
PathStripToRootA
PathFindExtensionA
PathFindFileNameA
oledlg
ord8
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CreateILockBytesOnHGlobal
OleFlushClipboard
OleIsCurrentClipboard
StgCreateDocfileOnILockBytes
CoRevokeClassObject
CoRegisterMessageFilter
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
Sections
.text Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ