t:\ace\x86\ship\0\acerep.pdb
Static task
static1
Behavioral task
behavioral1
Sample
85a50bc77c722fe73adbf17805978860N.dll
Resource
win7-20240704-en
General
-
Target
85a50bc77c722fe73adbf17805978860N.exe
-
Size
740KB
-
MD5
85a50bc77c722fe73adbf17805978860
-
SHA1
8b6a69191c2aeccb5f604ca819cb28ce213baa23
-
SHA256
51607e3f8b4a9eb676182217fcf598ca9d70ba6f2245328cdbcfaa2ee79c1e9b
-
SHA512
1de77ecf8bc3409349496ab8b1129ceef0ac1d3e3d2dda4fd91da7f40a6e3c49566deaceabec70ff20b414b5b8c3017559b2cc15e497b891b34d9fb9ddfc3923
-
SSDEEP
12288:8vZGhboIDVvuj7kiTczvwj408EJQgecjIMdlS4RKQVzthSuigTeW9fKnAG:8vZGhboIDVvuj7kiTczvwj4084ZecjID
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85a50bc77c722fe73adbf17805978860N.exe
Files
-
85a50bc77c722fe73adbf17805978860N.exe.dll windows:4 windows x86 arch:x86
b82031625c31655df4da24f5dd5a822e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ole32
CoCreateGuid
IIDFromString
StringFromGUID2
CoInitialize
CoCreateInstance
CoUninitialize
msvcr80
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
__clean_type_info_names_internal
_crt_debugger_hook
_except_handler4_common
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_decode_pointer
_encoded_null
_malloc_crt
_encode_pointer
fopen_s
fwprintf_s
fclose
vsprintf_s
wcscpy_s
vswprintf_s
_wassert
_time64
_localtime64_s
_wtoi
memmove
wcschr
_vsnwprintf
wcsrchr
memset
_stricmp
memcpy
iswctype
_vsnprintf
free
malloc
advapi32
RegSetValueExW
RegDeleteKeyW
RegEnumValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegCreateKeyExW
RegFlushKey
RegCloseKey
RegOpenKeyExA
kernel32
LoadLibraryA
GetSystemDirectoryW
LoadLibraryW
RaiseException
GetDriveTypeW
GetModuleHandleW
FindFirstFileW
GetFileAttributesW
GetShortPathNameW
GetFullPathNameW
GetTempPathW
GetComputerNameW
MoveFileW
CopyFileW
DeleteFileW
CreateFileW
GetTempFileNameW
LoadLibraryExW
VirtualProtect
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
GetProcessHeap
GetTempFileNameA
HeapFree
HeapAlloc
InterlockedExchange
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExpandEnvironmentStringsW
FlushFileBuffers
FreeLibrary
GetProcAddress
GetTickCount
DeleteFileA
GetVersionExA
DisableThreadLibraryCalls
GetLastError
CloseHandle
CreateFileA
GetTempPathA
WideCharToMultiByte
MultiByteToWideChar
FindClose
FindFirstFileA
Sleep
GetEnvironmentVariableA
GetFileSize
WriteFile
ReadFile
LocalAlloc
SetFilePointer
SetEndOfFile
OpenProcess
CreateProcessA
SuspendThread
CreateThread
TerminateThread
GlobalLock
GlobalAlloc
GlobalFree
GlobalUnlock
CreateMutexA
OpenMutexA
WaitForSingleObject
ReleaseMutex
CreateEventA
OpenEventA
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
FlushViewOfFile
SetEvent
ResetEvent
WaitForMultipleObjects
GetCurrentProcessId
GetStdHandle
user32
CharUpperW
PeekMessageA
Sections
.text Size: 496KB - Virtual size: 495KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ