ctrpp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c0a0348f84f6112af4f3869c24247ef49564e3c0ac90d46c5e8f9afb7e38f1b2.exe
Resource
win10v2004-20240704-en
General
-
Target
c0a0348f84f6112af4f3869c24247ef49564e3c0ac90d46c5e8f9afb7e38f1b2
-
Size
1.7MB
-
MD5
1ed2981e45e698e1e0d71356b64b0048
-
SHA1
1114f45cf0283de1fea15c5d4dfe353299efca4b
-
SHA256
c0a0348f84f6112af4f3869c24247ef49564e3c0ac90d46c5e8f9afb7e38f1b2
-
SHA512
576b8a745b8efb0f0932809501ed7b080b63c2196367f1495fa72bd428f6c13d73f94894b4c980b31882498a6269179fe65b243048d6892ff0defbd21a52979f
-
SSDEEP
24576:1zzTNjx+mZCkt76f/24pN+XNqNG6hditW:1z/f9Ckt7c20+9qNxUW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0a0348f84f6112af4f3869c24247ef49564e3c0ac90d46c5e8f9afb7e38f1b2
Files
-
c0a0348f84f6112af4f3869c24247ef49564e3c0ac90d46c5e8f9afb7e38f1b2.exe windows:10 windows x64 arch:x64
4a5023f965ce7575753f80a44e96fad5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
LocalFree
CreateEventW
InitializeCriticalSection
LoadResource
FindResourceExW
LockResource
FreeResource
EnterCriticalSection
LeaveCriticalSection
GetFileType
WriteConsoleW
WriteFile
GetStdHandle
GetFileSize
HeapReAlloc
SetLastError
ReadFile
MapViewOfFile
CreateFileMappingW
CloseHandle
MultiByteToWideChar
SetFileAttributesW
UnmapViewOfFile
GetFileAttributesW
GetLastError
SetEndOfFile
SetFilePointer
GetProcAddress
WideCharToMultiByte
FreeLibrary
LoadLibraryExW
GetModuleHandleW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
FormatMessageW
FindClose
FindNextFileW
FindFirstFileExW
GetProcessHeap
HeapAlloc
HeapSetInformation
CompareStringOrdinal
HeapFree
CreateFileW
DeleteFileW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SizeofResource
api-ms-win-crt-runtime-l1-1-0
_initterm_e
_c_exit
_initterm
_register_thread_local_exe_atexit_callback
api-ms-win-crt-private-l1-1-0
_o__callnewh
_o__cexit
_o__configthreadlocale
_o__configure_wide_argv
_o__crt_atexit
_o__errno
_o__exit
_o__get_initial_wide_environment
_o__initialize_onexit_table
_o__initialize_wide_environment
_o__invalid_parameter_noinfo
_o__invalid_parameter_noinfo_noreturn
_o__register_onexit_function
_o__seh_filter_exe
_o__set_app_type
_o__set_fmode
_o__set_new_mode
_o__wcslwr_s
_o__wcsnicmp
_o__wfopen
_o__wmakepath_s
_o__wsplitpath_s
_o__wtof
_o_calloc
_o_exit
_o_fclose
_o_fgetws
_o_floor
_o_free
_o_iswdigit
_o_malloc
_o_terminate
_o_wcscpy_s
_o_wcstol
_o_wcstoul
_CxxThrowException
_o___stdio_common_vswprintf
_o___stdio_common_vsprintf
_o___stdio_common_vfwprintf
_o___stdio_common_vfprintf
_o___std_exception_destroy
_o___std_exception_copy
_o___p__commode
_o___p___wargv
_o___p___argc
_o___acrt_iob_func
wcsstr
__C_specific_handler
__CxxFrameHandler3
memcpy
memmove
api-ms-win-crt-string-l1-1-0
wcscmp
memset
wcsncmp
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
oleaut32
SysAllocStringByteLen
VariantClear
SysFreeString
SysAllocString
SysStringByteLen
VariantChangeType
VariantInit
VariantCopy
SysStringLen
SysAllocStringLen
advapi32
IsTextUnicode
TraceMessage
user32
LoadStringW
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
IIDFromString
StringFromGUID2
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE