E:\workspace\MetaTrader5\Build\Installers\Distributive Core\Release64\core.pdb
Static task
static1
Behavioral task
behavioral1
Sample
34770b1069724c8062ac65a2efbae230N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
34770b1069724c8062ac65a2efbae230N.exe
Resource
win10v2004-20240704-en
General
-
Target
34770b1069724c8062ac65a2efbae230N.exe
-
Size
5.2MB
-
MD5
34770b1069724c8062ac65a2efbae230
-
SHA1
55de709b3acbb6de2c95a7a115c376fec505bf7b
-
SHA256
3f7fa6d37a9b682bf242216482992355681404bf456ff89288aee2aaaf968dce
-
SHA512
366baa9b122574b76c1669fc73f5327be101e02d12a3ff6050f38be2123a909c4f21c0a23970d770940a28e44564ede2baa5b54430c6653d3742854f50d7b923
-
SSDEEP
98304:9EZoFCptSP5ucwHQSd611RrgERP5WhnLjU:9EyFCpturAd611RrgERI53U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34770b1069724c8062ac65a2efbae230N.exe
Files
-
34770b1069724c8062ac65a2efbae230N.exe.exe windows:6 windows x64 arch:x64
b9c3794526601e9a909033c4ac2b9ee7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
recv
shutdown
WSAGetLastError
WSASend
WSARecv
select
ioctlsocket
WSAConnect
setsockopt
bind
WSASocketW
htons
WSAStartup
WSACleanup
GetAddrInfoW
FreeAddrInfoW
InetPtonW
send
closesocket
crypt32
CertGetNameStringW
kernel32
FindFirstFileW
FindClose
FindNextFileW
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
FileTimeToDosDateTime
GetModuleHandleW
lstrcmpiW
SizeofResource
LoadResource
FindResourceW
InitializeCriticalSectionEx
RaiseException
GetCurrentProcess
GetCurrentProcessId
Thread32Next
ReadProcessMemory
ResumeThread
GetThreadContext
SuspendThread
OpenThread
Thread32First
CreateToolhelp32Snapshot
GetCurrentThread
Module32NextW
LockResource
FindResourceExW
Module32FirstW
GetProcessHandleCount
GetLogicalProcessorInformationEx
GetLocalTime
K32GetProcessMemoryInfo
GetEnvironmentVariableW
AddVectoredExceptionHandler
SetUnhandledExceptionFilter
LocalFree
DecodePointer
OpenProcess
HeapSize
GetProcessHeap
CompareStringW
lstrlenW
VerifyVersionInfoW
VerSetConditionMask
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
IsValidCodePage
FreeResource
EnumResourceNamesW
CreateProcessW
MoveFileExW
GetFileSize
CopyFileW
EnterCriticalSection
GetDiskFreeSpaceExW
RemoveDirectoryW
GetTempPathW
TerminateThread
Process32FirstW
K32GetProcessImageFileNameW
Process32NextW
GetSystemTime
WakeAllConditionVariable
VirtualQuery
LoadLibraryExA
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
RtlUnwindEx
RtlPcToFileHeader
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetFileType
GetStdHandle
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
FileTimeToSystemTime
DosDateTimeToFileTime
HeapReAlloc
GetStartupInfoW
HeapFree
HeapAlloc
DeviceIoControl
LoadLibraryExW
GetProcAddress
FreeLibrary
GetSystemDirectoryW
GetVolumeInformationW
GetSystemInfo
GetCPInfo
GetStringTypeW
GetACP
GetOEMCP
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetVersionExW
GetUserDefaultUILanguage
GlobalMemoryStatusEx
GetModuleFileNameW
WaitForSingleObject
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
ReleaseSRWLockExclusive
GetActiveProcessorCount
GetTickCount64
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
GetFileAttributesExW
GetConsoleOutputCP
SetStdHandle
FlushFileBuffers
HeapDestroy
GetFileAttributesW
CreateDirectoryW
SetFileAttributesW
HeapCreate
WriteFile
SetEndOfFile
SetFilePointer
QueryPerformanceCounter
QueryPerformanceFrequency
SystemTimeToFileTime
VirtualAlloc
VirtualFree
WideCharToMultiByte
GetCurrentThreadId
SetThreadStackGuarantee
DeleteFileW
CreateFileW
GetFileSizeEx
ReadFile
GetLastError
Sleep
LeaveCriticalSection
lstrcmpW
GetExitCodeThread
FindFirstFileExW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetLastError
user32
MoveWindow
ShowWindow
MessageBoxW
SetForegroundWindow
BringWindowToTop
GetDlgItem
SetClassLongPtrW
PostQuitMessage
SetWindowTextW
GetWindow
LoadStringW
MapWindowPoints
GetMonitorInfoW
MonitorFromWindow
EnableWindow
LoadIconW
DialogBoxParamW
RegisterClassExW
GetWindowRect
GetClassInfoExW
PostMessageW
IsWindowVisible
LoadImageW
SetTimer
LoadBitmapW
GetClassNameW
SetWindowLongW
SetWindowPos
LoadCursorW
CreateWindowExW
GetWindowTextLengthW
GetWindowTextW
BeginPaint
EndPaint
FillRect
IsWindowEnabled
GetFocus
DrawFocusRect
SetCursor
TrackMouseEvent
GetCapture
ReleaseCapture
GetCursorPos
ScreenToClient
UpdateWindow
IsWindow
GetDC
ReleaseDC
GetWindowLongW
OffsetRect
InvalidateRect
CallWindowProcW
GetWindowLongPtrW
SetWindowLongPtrW
DefWindowProcW
DrawTextW
SetRectEmpty
GetSysColor
PtInRect
SetFocus
SetCapture
GetParent
SendMessageW
GetDlgCtrlID
GetClientRect
UnregisterClassW
DestroyWindow
GetActiveWindow
CharLowerW
CharNextW
PostMessageA
GetSystemMetrics
MessageBeep
EndDialog
GetTopWindow
GetWindowThreadProcessId
KillTimer
SystemParametersInfoW
gdi32
SetBkMode
SetTextColor
ExtTextOutW
SetBkColor
GetStockObject
CreateFontIndirectW
GetObjectW
DeleteDC
DeleteObject
GetTextExtentPoint32W
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
GdiGradientFill
BitBlt
GetTextExtentPointW
TextOutW
RestoreDC
SaveDC
CreateFontW
EnumFontFamiliesExW
CreateDIBitmap
SelectObject
GetDIBits
advapi32
GetFileSecurityW
GetAclInformation
GetAce
EqualSid
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetTokenInformation
OpenProcessToken
FreeSid
SetNamedSecurityInfoW
SetEntriesInAclW
AllocateAndInitializeSid
RegDeleteKeyExW
RegEnumKeyW
OpenSCManagerW
EnumServicesStatusW
CloseServiceHandle
OpenServiceW
QueryServiceStatus
ControlService
QueryServiceConfigW
RegQueryValueW
GetSecurityDescriptorDacl
shell32
ShellExecuteExW
SHGetPathFromIDListW
SHGetFolderPathW
SHGetFileInfoW
SHGetSpecialFolderPathW
SHChangeNotify
SHBrowseForFolderW
SHGetSpecialFolderLocation
ShellExecuteW
ole32
CreateStreamOnHGlobal
CoUninitialize
CoInitializeEx
CoInitializeSecurity
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoSetProxyBlanket
oleaut32
SysAllocString
SysFreeString
VariantClear
VarUI4FromStr
shlwapi
PathCanonicalizeW
PathFindExtensionW
comctl32
DestroyPropertySheetPage
PropertySheetW
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_Create
ImageList_SetBkColor
ImageList_AddMasked
ImageList_Draw
ImageList_Destroy
InitCommonControlsEx
CreatePropertySheetPageW
dbghelp
SymFunctionTableAccess64
MiniDumpWriteDump
SymLoadModule64
SymGetOptions
SymSetOptions
SymGetModuleBase64
StackWalk64
SymInitialize
gdiplus
GdipCreateBitmapFromStream
GdipCreateHBITMAPFromBitmap
GdipCloneImage
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipDisposeImage
wintrust
WTHelperGetProvCertFromChain
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WinVerifyTrust
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 721KB - Virtual size: 720KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 61.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ