b:\source\source.IC\31416\Release_WDExe_686\WX\Win32\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe
Resource
win10v2004-20240709-en
General
-
Target
9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40
-
Size
1.2MB
-
MD5
496a8adbba26ad659a82985bb67dd85d
-
SHA1
a2026f727f69df0c156b6ce0569e86fc36faebe5
-
SHA256
9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40
-
SHA512
8817867174cb2e341515e31d218eb2059ed56909328e38b009b728b359703610a26fa571f6ec87ac81e28e828765ba121b4f9f6d11ff78e047a406725b667aad
-
SSDEEP
24576:idFMCC3AST5LLbFFUqlMvTzvLsx+4QhbCxKV/4n:olC35DUFXQg4QJCoV/2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40
Files
-
9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe windows:4 windows x86 arch:x86
7e44be7105bdcd13e51de50674f856ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_except_handler3
_onexit
__dllonexit
isdigit
_snprintf
strncpy
vsprintf
_mbclen
_mbsinc
memcmp
wcscpy
_ismbcspace
realloc
_mbctoupper
_mbspbrk
_mbsrchr
_makepath
_stati64
memmove
_mbsstr
wcscat
wcschr
_mbschr
memchr
_vsnprintf
rand
wcslen
_mbsnbcpy
_mbsnbicmp
sprintf
atoi
strcat
strcpy
_mbscmp
strncmp
_mbsicmp
memcpy
_stricmp
gmtime
time
strlen
free
malloc
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
kernel32
FreeLibrary
RaiseException
GetSystemDefaultLangID
CreateThread
TerminateThread
ResumeThread
CreateProcessA
InterlockedExchange
ReleaseSemaphore
CreateSemaphoreA
MultiByteToWideChar
CompareStringA
WritePrivateProfileStringA
GetCurrentThreadId
TlsFree
TlsAlloc
VirtualProtect
VirtualQuery
TlsGetValue
TlsSetValue
GetFullPathNameA
FindNextFileA
SetFileAttributesA
GetFileAttributesA
FindClose
FindFirstFileA
CreateDirectoryA
CopyFileA
MoveFileA
DeleteFileA
CreateFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
SetErrorMode
SetEndOfFile
FlushFileBuffers
UnlockFileEx
LockFileEx
GetVersion
UnlockFile
LockFile
SetFilePointer
WriteFile
WideCharToMultiByte
GetDriveTypeA
GetVolumeInformationA
GetLogicalDriveStringsA
GetFileInformationByHandle
lstrlenA
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateMailslotA
ExpandEnvironmentStringsA
GetLocalTime
GetComputerNameA
GetProfileStringA
ReadFile
GetExitCodeProcess
GetMailslotInfo
Sleep
GetPrivateProfileStringA
GetPrivateProfileIntA
ExitProcess
GetCommandLineA
LocalFree
GetModuleFileNameA
GetLastError
CreateFileMappingA
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GetModuleHandleA
GetProcAddress
CreateEventA
GetStartupInfoA
MulDiv
LoadLibraryA
SetEvent
FormatMessageA
FindResourceA
LoadResource
LockResource
FreeResource
GetTempPathA
GetTempFileNameA
OpenFileMappingA
CreateMutexA
WaitForSingleObject
ReleaseMutex
GetCurrentProcessId
Exports
Exports
CommandeComposante
DeclareProxy
GeneralParam
LibereMutex
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ