D:\a\_work\1\s\\binaries\x86ret\bin\i386\ml.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e26c2b95560a6ae2633390d05a597b670f2be133f10b1dae92e6483b1fe247d8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e26c2b95560a6ae2633390d05a597b670f2be133f10b1dae92e6483b1fe247d8.exe
Resource
win10v2004-20240709-en
General
-
Target
e26c2b95560a6ae2633390d05a597b670f2be133f10b1dae92e6483b1fe247d8
-
Size
1.0MB
-
MD5
34ab0ca8e365f350b56e56a31b01bb56
-
SHA1
0840fed00b1d652382da9fafa915d7b65626bf54
-
SHA256
e26c2b95560a6ae2633390d05a597b670f2be133f10b1dae92e6483b1fe247d8
-
SHA512
840c4374cb507b526d8122640de92eb49bf8cce443d1b3d92ebd254081ffcae5a73068b8c1896e2ec0ec4b6a7d07a73b1b7ac7197f572a150133d57e60936e82
-
SSDEEP
24576:CxOOprFPLpctPz1wnsdZCA6N3Q6itdsOeg:Cx90wnsdZz6N3Q6itmOH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e26c2b95560a6ae2633390d05a597b670f2be133f10b1dae92e6483b1fe247d8
Files
-
e26c2b95560a6ae2633390d05a597b670f2be133f10b1dae92e6483b1fe247d8.exe windows:6 windows x86 arch:x86
0501aa01f543aa45edf68fce2e574283
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptAcquireContextW
kernel32
CreateFileMappingW
MapViewOfFileEx
CloseHandle
UnmapViewOfFile
LoadLibraryExW
GetProcAddress
GetModuleHandleW
CreateFileW
GetFileSize
MapViewOfFile
SetConsoleCtrlHandler
Sleep
SetErrorMode
VirtualQuery
GetModuleFileNameW
FindResourceW
LoadResource
GetCPInfo
WideCharToMultiByte
MultiByteToWideChar
GetFileType
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
vcruntime140
memcpy
memset
__current_exception_context
__current_exception
_except_handler4_common
memcmp
memmove
api-ms-win-crt-heap-l1-1-0
realloc
malloc
calloc
free
_set_new_mode
api-ms-win-crt-convert-l1-1-0
_ltow_s
_wtoi
_ultow_s
_ltoa_s
_atoflt
_atoldbl
_atodbl
api-ms-win-crt-time-l1-1-0
_strdate_s
_strtime_s
_time64
api-ms-win-crt-string-l1-1-0
_strnicmp
towupper
_wcsnicmp
strcat_s
iswspace
wcsncat_s
wcscpy_s
wcscat_s
strncmp
_stricmp
strcpy_s
_strupr_s
_wcsicmp
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfwprintf
_set_fmode
_lseek
_tell
_write
fputws
__stdio_common_vsprintf_s
fflush
__acrt_iob_func
_fileno
_isatty
_read
_get_osfhandle
_close
_wsopen_s
__p__commode
api-ms-win-crt-runtime-l1-1-0
signal
_seh_filter_exe
_set_app_type
terminate
__p__wpgmptr
_initialize_wide_environment
_get_initial_wide_environment
_initterm
_initterm_e
_exit
_controlfp_s
__p___argc
__p___wargv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_errno
_configure_wide_argv
_initialize_onexit_table
_register_onexit_function
_crt_atexit
exit
api-ms-win-crt-environment-l1-1-0
_wdupenv_s
_wgetcwd
_dupenv_s
_wputenv_s
api-ms-win-crt-filesystem-l1-1-0
_waccess
_wremove
_wfullpath
_wsplitpath_s
_wmakepath_s
api-ms-win-crt-process-l1-1-0
_wspawnvp
_wspawnv
_wspawnlp
api-ms-win-crt-conio-l1-1-0
_cputws
__conio_common_vcwprintf
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 371KB - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 608KB - Virtual size: 612KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE