D:\a\_work\1\s\\binaries\x86ret\bin\i386\pgomgr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1ab576332e7fa2be22c0871408cff280N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1ab576332e7fa2be22c0871408cff280N.exe
Resource
win10v2004-20240704-en
General
-
Target
1ab576332e7fa2be22c0871408cff280N.exe
-
Size
638KB
-
MD5
1ab576332e7fa2be22c0871408cff280
-
SHA1
3f9022b6e0fa5dad00c83fae904f8d3a94834b6f
-
SHA256
f04706b15deb1815733c0cf4715960e6d7526091f703b296806910ea9699803e
-
SHA512
79d98e7e518e9671ff1e19a904da440be7dad45d82041269e2d2234dd71aeb294092cc2ce6895c69ede8165b1eeec6038a27ca55dba23332fd11642fb55bbde8
-
SSDEEP
12288:jBB3etSefIxn85c6S4Hb4849nIYVjIlCOU4hog96o2gZ:jTetSef65gcTVjUCs2Vo2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1ab576332e7fa2be22c0871408cff280N.exe
Files
-
1ab576332e7fa2be22c0871408cff280N.exe.exe windows:6 windows x86 arch:x86
1fa4de8a2407221a129267000545ba9e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstFileW
FindNextFileW
GetEnvironmentVariableW
FindClose
GetFileAttributesW
MultiByteToWideChar
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
EncodePointer
FormatMessageW
LocalFree
UnmapViewOfFile
MapViewOfFileEx
CreateFileMappingW
CloseHandle
GetFileSize
CreateFileW
SetLastError
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
WideCharToMultiByte
WriteFile
GetFileType
GetUserDefaultUILanguage
LoadResource
LoadLibraryExW
GetProcAddress
GetModuleFileNameW
FindResourceExW
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
DecodePointer
vcruntime140
_except_handler4_common
memset
__current_exception_context
__current_exception
__unDNameEx
_CxxThrowException
strstr
__std_terminate
__std_exception_copy
__std_exception_destroy
__CxxFrameHandler3
wcschr
memmove
wcsrchr
memcpy
api-ms-win-crt-runtime-l1-1-0
exit
_controlfp_s
_initialize_onexit_table
terminate
_register_onexit_function
_cexit
__p___wargv
__p___argc
_exit
_initterm_e
_initterm
_get_initial_wide_environment
_initialize_wide_environment
_configure_wide_argv
_c_exit
_set_app_type
_seh_filter_exe
_crt_atexit
_register_thread_local_exe_atexit_callback
_invalid_parameter_noinfo_noreturn
_errno
api-ms-win-crt-heap-l1-1-0
malloc
calloc
free
_set_new_mode
_callnewh
api-ms-win-crt-stdio-l1-1-0
fputs
_fileno
__stdio_common_vsnwprintf_s
__stdio_common_vswscanf
fflush
_get_osfhandle
fclose
_wfopen_s
__stdio_common_vswprintf_s
_set_fmode
__p__commode
__acrt_iob_func
api-ms-win-crt-string-l1-1-0
_wcsdup
_wcsnicmp
_wcsicmp
wcsncat_s
wcsncpy_s
wcscpy_s
wcscat_s
wcstok_s
api-ms-win-crt-filesystem-l1-1-0
_wsplitpath_s
_waccess_s
api-ms-win-crt-convert-l1-1-0
_wtoi
wcstoul
wcstol
_itow_s
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
msvcp140
?_Xlength_error@std@@YAXPBD@Z
pgodb140
?FreeMemory@PogoDbUtil@@SGXPAX@Z
PogoDbStreamNames
?NewPgdObject@PogoDbUtil@@SGPAVPogoDbInterface@@XZ
?GetErrorText@PogoDbUtil@@SGPBGW4POGODB_ERROR@@@Z
?GetMachineAttributes@PogoDbUtil@@SGPAUtagPGDMACHINEATTR@@K@Z
?FormatTime_s@PogoDbUtil@@SGHPB_KPADI@Z
?DeletePgdObject@PogoDbUtil@@SGPAVPogoDbInterface@@PAV2@@Z
api-ms-win-crt-environment-l1-1-0
_wdupenv_s
api-ms-win-crt-conio-l1-1-0
_cputws
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE