D:\Dev\workspace\v14\bin\Win32\Release\Tray.pdb
Static task
static1
Behavioral task
behavioral1
Sample
774f228c2afa9b9d12dd114c75365c9c8269bf9dda09fc16edc37ebd19a7cca3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
774f228c2afa9b9d12dd114c75365c9c8269bf9dda09fc16edc37ebd19a7cca3.exe
Resource
win10v2004-20240709-en
General
-
Target
774f228c2afa9b9d12dd114c75365c9c8269bf9dda09fc16edc37ebd19a7cca3
-
Size
734KB
-
MD5
013532d8ad019d77d068c15fdfd716dd
-
SHA1
7aad22f51dbfa5f1735d47daacb56c0028c84c43
-
SHA256
774f228c2afa9b9d12dd114c75365c9c8269bf9dda09fc16edc37ebd19a7cca3
-
SHA512
f6e092b88e24c3a1b7efcd9bef3bf1187d0f30e71463779f0291eaf9249b110dc8ae560955e6c2dd921b9928c760421ccdfe0292b17a1221774974a7df3a6299
-
SSDEEP
12288:WA3LpGRlS4NVS6cIbMUUieK9UUieKpEN495w:WKpGRk0SKb4NCNYu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 774f228c2afa9b9d12dd114c75365c9c8269bf9dda09fc16edc37ebd19a7cca3
Files
-
774f228c2afa9b9d12dd114c75365c9c8269bf9dda09fc16edc37ebd19a7cca3.exe windows:6 windows x86 arch:x86
da1ff5c55d6a255dc71ad9950f222072
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Process32FirstW
CloseHandle
GetCurrentProcessId
CreateProcessW
CreateDirectoryW
WriteFile
SetFilePointer
CreateMutexW
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
MultiByteToWideChar
GetLocalTime
GetTimeFormatW
GetFileSize
GetComputerNameW
GetDateFormatW
Sleep
Process32NextW
WaitForMultipleObjects
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapSize
SetFilePointerEx
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetLastError
GetPrivateProfileStringW
ProcessIdToSessionId
CreateEventW
CreateToolhelp32Snapshot
OpenEventW
WaitForSingleObject
SetEvent
GetModuleFileNameW
FindClose
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
MoveFileExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
HeapAlloc
HeapFree
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
WriteConsoleW
user32
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
DestroyMenu
TrackPopupMenu
SetForegroundWindow
DispatchMessageW
CreatePopupMenu
GetCursorPos
LoadImageW
CreateWindowExW
RegisterClassW
DestroyIcon
PostMessageW
PostQuitMessage
DefWindowProcW
DestroyWindow
InsertMenuW
advapi32
RegSetValueExW
GetUserNameW
SetSecurityDescriptorDacl
RegCloseKey
InitializeSecurityDescriptor
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
shell32
SHGetFolderPathW
Shell_NotifyIconW
Sections
.text Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 434KB - Virtual size: 434KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ