SqlDumper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
193a78ff0773241398300d5dfc4a49d0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
193a78ff0773241398300d5dfc4a49d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
193a78ff0773241398300d5dfc4a49d0N.exe
-
Size
156KB
-
MD5
193a78ff0773241398300d5dfc4a49d0
-
SHA1
70b464391119edf0521c61fbc1c9449e5f7d88e7
-
SHA256
213b6b6344bc8034e9fc49e302ac339722c682ff66fccddfee7716eff6f07233
-
SHA512
f72eac0e2004c7c829ad5f15eb53ec87f194d16f833c792680668db095039a0e30b08d00a09ed569d4f14cfb1118bfd307b87c407687f0f5b0c4950ba680e43c
-
SSDEEP
3072:Bf4iVa0R+KWV9/XjygYbvD5NFm3I8IYgDfW26fIxKZ95q:Bf4iVaKWVp8jDPjxe6xKv8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 193a78ff0773241398300d5dfc4a49d0N.exe
Files
-
193a78ff0773241398300d5dfc4a49d0N.exe.exe windows:6 windows x86 arch:x86
b4e208aa1b031e1f98fcad5412785a26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
StartServiceCtrlDispatcherW
RegCloseKey
RegQueryValueExW
CloseServiceHandle
QueryServiceStatusEx
StartServiceW
OpenServiceW
OpenSCManagerW
SetServiceStatus
RegisterServiceCtrlHandlerExW
RegOpenKeyExA
kernel32
GetCurrentProcessId
GetCurrentThreadId
FlushFileBuffers
WriteFile
SetFilePointer
GetFileSize
CreateFileW
CloseHandle
GetLastError
GetCurrentProcess
FormatMessageW
ExitProcess
SleepEx
Sleep
GetProcAddress
GetModuleHandleW
ReadProcessMemory
GetSystemInfo
DebugBreak
OpenProcess
SetConsoleCtrlHandler
DeleteFileW
GetVersionExW
FreeLibrary
LoadLibraryExW
GetComputerNameW
EnterCriticalSection
SetEvent
InterlockedDecrement
WaitForSingleObject
CreateThread
CreateEventW
GetExitCodeThread
ResumeThread
SuspendThread
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
Thread32Next
OpenThread
Thread32First
CreateToolhelp32Snapshot
GetSystemDefaultLCID
CreateProcessW
GetStartupInfoW
GetSystemWindowsDirectoryW
FindClose
FindNextFileW
FindFirstFileW
ReadFile
VirtualFree
VirtualAlloc
VirtualQuery
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
UnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
LeaveCriticalSection
InterlockedIncrement
SetEnvironmentVariableW
GetEnvironmentVariableW
CompareStringW
HeapReAlloc
GetProcessHeap
lstrlenW
LocalAlloc
LoadLibraryA
RaiseException
TerminateProcess
msvcr80
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_invoke_watson
_controlfp_s
_crt_debugger_hook
__winitenv
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_wtoi
_wmakepath_s
wcsrchr
wcschr
_wsplitpath_s
wcsnlen
exit
wcsncmp
wcstoul
swscanf_s
??3@YAXPAX@Z
_wcsicmp
??2@YAPAXI@Z
qsort
memset
_wstrdate_s
_wstrtime_s
_vsnwprintf
wprintf
_initterm
dbghelp
MiniDumpWriteDump
ImageNtHeader
psapi
GetModuleInformation
EnumProcessModules
GetModuleFileNameExW
rpcrt4
UuidFromStringW
UuidCreate
UuidToStringW
RpcStringFreeW
iphlpapi
GetExtendedTcpTable
ws2_32
ntohs
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE