d:\Source\Wdprj\WDExe\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4cd893ee2b1a2288a06dc61e00de6050N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4cd893ee2b1a2288a06dc61e00de6050N.exe
Resource
win10v2004-20240709-en
General
-
Target
4cd893ee2b1a2288a06dc61e00de6050N.exe
-
Size
334KB
-
MD5
4cd893ee2b1a2288a06dc61e00de6050
-
SHA1
78204befad0001f76db2f9f234b95d6bcd954eda
-
SHA256
4ff4658d924c41aa542fda70e927d393eb5a3e2252d69172aca1339f0ef71d8c
-
SHA512
1966d4894ba03014f09fdc3ffe618d5cc0307f04e003418f11b5e42bf44ebcbdc56bcd1f9850a19e9c7504d728127130ad4551aba49e7a0f63d80af2e44e0e88
-
SSDEEP
6144:FR2eVXgOJVwuw4i19h+sdYfT7kBm4O0esY/GGzPIY5H+x8ij3Tmmu7RA:2vOJFMT+sdYfT78m4OvbGmPIQeuiemIW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4cd893ee2b1a2288a06dc61e00de6050N.exe
Files
-
4cd893ee2b1a2288a06dc61e00de6050N.exe.exe windows:4 windows x86 arch:x86
2e27991bb1faa865d07e322c98c6ad9c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
isdigit
vsprintf
_mbclen
_mbsinc
_ismbcspace
atoi
realloc
_mbspbrk
_mbsrchr
_makepath
memmove
_mbsstr
wcscat
wcslen
wcschr
_mbschr
memchr
_vsnprintf
_purecall
_mbscmp
strcat
_mbsnbcpy
sprintf
strlen
strncmp
strcpy
_stricmp
_mbsicmp
memcpy
memset
free
malloc
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
kernel32
GetTempPathA
RaiseException
InterlockedExchange
LocalAlloc
GetStartupInfoA
CreateThread
TerminateThread
ResumeThread
MultiByteToWideChar
GetCurrentThreadId
TlsFree
TlsAlloc
VirtualProtect
VirtualQuery
TlsGetValue
TlsSetValue
GetModuleHandleA
GetFullPathNameA
GetVersionExA
FindNextFileA
GetFileAttributesA
FindClose
FindFirstFileA
CreateDirectoryA
CopyFileA
MoveFileA
DeleteFileA
SetEndOfFile
FlushFileBuffers
UnlockFile
LockFile
SetFilePointer
WriteFile
SetLastError
CreateFileA
SetErrorMode
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateMailslotA
ExpandEnvironmentStringsA
GetLocalTime
GetComputerNameA
GetProfileStringA
ReadFile
CreateFileMappingA
GetLastError
CloseHandle
MapViewOfFile
UnmapViewOfFile
LoadLibraryA
GetModuleFileNameA
CreateMutexA
WaitForSingleObject
ReleaseMutex
GetCurrentProcessId
FindResourceA
LoadResource
LockResource
FreeResource
FreeLibrary
CreateEventA
GetTempFileNameA
OpenFileMappingA
GetProcAddress
GetSystemDefaultLangID
FormatMessageA
LocalFree
GetPrivateProfileIntA
GetPrivateProfileStringA
GetCommandLineA
CreateProcessA
Sleep
GetMailslotInfo
GetExitCodeProcess
Exports
Exports
CommandeComposante
DeclareProxy
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ