FiltReg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
04392a681442ce975234508533c8ac50N.exe
Resource
win10v2004-20240709-en
General
-
Target
04392a681442ce975234508533c8ac50N.exe
-
Size
1.3MB
-
MD5
04392a681442ce975234508533c8ac50
-
SHA1
0122f7e0c21de4b48b08f057fb224431761cb95a
-
SHA256
fc1ca3622deb1679764379e797cf028b83878353e3b1b32a0ae9a91b516df9ca
-
SHA512
d5164d6fd561c843dcb262e975537997a9a4fc84463201fa693e7841f98712d83f008d56846a651029bb921169ba1b44074fe07f13ddcfc06760fa19a21b081a
-
SSDEEP
12288:B7d0NxksRpWE9FRHSfNm1wgbIxnBw7dzE+e3gxZC6LgjigDy5fdv8fWi+:BCks7WE9F5pwg8zmdqQjC60jiHkU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04392a681442ce975234508533c8ac50N.exe
Files
-
04392a681442ce975234508533c8ac50N.exe.exe windows:10 windows x86 arch:x86
918d18ea5b5619563d5db9e6909bcf8c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegCloseKey
RegQueryInfoKeyW
kernel32
HeapSetInformation
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
GetTickCount
msvcrt
_cexit
_initterm
?terminate@@YAXXZ
_controlfp
_except_handler4_common
__p__fmode
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
printf
_wcsicmp
__setusermatherr
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE